The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-...
详细信息
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as *** provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct *** the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk ***file could be retrieved by performing the opera-tions in *** the regenerating code,the model could regenerate the missing and corrupted chunks from the *** proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage *** results analysis show that the proposed model has been tested with storage space and response time for storage and *** VCSA model consumes 1.5x(150%)storage *** was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA *** response time VCSA model was tested with different sizedfiles starting from 2 to 16 *** response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval.
This paper uses the data of China's three major industries' value-added, employment and China's fiscal revenue from 2000 to 2020 to conduct an empirical study on the factors affecting China's fiscal re...
详细信息
Autonomous drones and deep learning neural networks are becoming popular tools to revolutionize aircraft operations by partially automating visual inspection processes in aircraft maintenance. The research aims to pro...
详细信息
When cryptography becomes insecure, a migration to new schemes is required. Often the migration process is very complicated, but the time available is very limited. Only if the used cryptographic algorithms, protocols...
详细信息
Artificial intelligence (AI) significantly influences the systems and applications that underpin modern life. Large datasets are generated from diverse sources. Hence, there is a need for effective data monitoring, pr...
详细信息
This study investigates the performance of various machine learning (ML) algorithms in predicting transportation modes from large datasets. The investigated algorithms include Multilayer Perceptron (MLP), K-Nearest Ne...
详细信息
With the continuous advancement of autonomous driving technology, 3D vehicle detection has become of widespread interest. The traditional aggregate view object detection (AVOD) framework has achieved some good results...
详细信息
With the continuous advancement of autonomous driving technology, 3D vehicle detection has become of widespread interest. The traditional aggregate view object detection (AVOD) framework has achieved some good results in 3D vehicle detection tasks. However, the complexity of the 3D vehicle detection scenario makes the current detection methods still not meet the actual requirements. To enhance the detection accuracy of 3D vehicle targets, we propose to equip an attention mechanism to improve the representation capability of feature maps, thereby further increasing the precision of 3D vehicle detection. Specifically, we have added the channel attention ECANet, spatial attention SANet, and mixed attention ECANet+SANet respectively into the image-based feature pyramid network of the AVOD detection framework, which can enhance the feature maps representation and improve the detection accuracy observably. The improved AVOD network is verified using the KITTI dataset. By showing the detection results of these attention mechanisms, it is found that the feature pyramid networks (FPN) module in the AVOD network based on Image has the best performance when integrating a mixed attention mechanism. In comparison to the original AVOD network, the detection results on the average precision index of the proposed method have improved by 2.29%, 2.81%, and 1.32% in the three indexes of simple, medium, and difficult, respectively. Extensive experiments have confirmed the practicality and efficacy of the AVOD network to equip the attention mechanisms for 3D vehicle detection. IEEE
We present CMTJ—a simulation package for large-scale macrospin analysis of multilayer spintronics *** from conventional simulations,such as magnetoresistance and magnetisation hysteresis loops,CMTJ implements a mathe...
详细信息
We present CMTJ—a simulation package for large-scale macrospin analysis of multilayer spintronics *** from conventional simulations,such as magnetoresistance and magnetisation hysteresis loops,CMTJ implements a mathematical model of dynamic experimental techniques commonly used for spintronics devices characterisation,for instance:spin diode ferromagnetic resonance,pulse-induced microwave magnetometry,or harmonic Hall voltage *** find that macrospin simulations offer a satisfactory level of agreement,demonstrated by a variety of *** a unified simulation package,CMTJ aims to accelerate wide-range parameter search in the process of optimising spintronics devices.
The integration of Artificial intelligence (AI) in education (AIEd) opens the possibilities for creating new content, virtual teaching, and personalized learning experiences. This paper studies the different innovativ...
详细信息
Cloud Computing has enabled many application providers to deploy web applications in cloud data centers with the advent of on-demand resource allocation and self-healing techniques that provide high availability and f...
详细信息
暂无评论