Current developments in cloud services, artificial intelligence (AI), and the Internet of Things (IoT) have transformed the traditional healthcare system into smart healthcare. Improved medical services can be achieve...
详细信息
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C...
详细信息
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.
In situations when the precise position of a machine is unknown,localization becomes *** research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-...
详细信息
In situations when the precise position of a machine is unknown,localization becomes *** research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-based *** order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology,this study proposed an optimized machine learning(ML)based *** signal strength indicator(RSSI)data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout *** noise factor is also taken into account,and the signal-to-noise ratio(SNR)value is recorded for every RSSI *** study concludes the examination of reference point accuracy with the modified KNN method(MKNN).MKNN was created to more precisely anticipate the position of the reference *** findings showed that MKNN outperformed other algorithms in terms of accuracy and complexity.
To address the formation tracking issue of mobile robotic systems, this paper constructs a novel hybrid dynamic event-triggered intermittent control strategy, which can achieve the exponential synchronization of the s...
详细信息
To address the formation tracking issue of mobile robotic systems, this paper constructs a novel hybrid dynamic event-triggered intermittent control strategy, which can achieve the exponential synchronization of the systems. Considering the limited control resources, the intermittent control method is introduced into the distributed control strategy to save resources, and the existing intermittent control model is reconstructed to describe the system model better. A hybrid dynamic event-triggered mechanism is developed by combining the dynamic event-triggered method with the time sampling strategy, eliminating the Zeno phenomenon. The control time sequences in the developed intermittent control strategy are automatically selected by the hybrid dynamic event-triggered sequences, rather than artificially designed in advance, which reduces a certain degree of design complexity. The developed control strategy effectively saves control resources while alleviating the burden of network communication. Sufficient conditions for achieving exponential synchronization formation tracking are provided, and the exponential convergence of the formation error is demonstrated through the proposed lemma. Finally, a control task of multi-mobile robots formation is presented to verify the effectiveness of the theoretical analysis. IEEE
作者:
Alzahrani, AbdulkreemAl Baha University
Faculty of Computer Science and Information Technology Department of Computer Engineering and Science Al Baha Saudi Arabia
Intelligent environments rely heavily on the Internet of Things, which can be targeted by malicious attacks. Therefore, the autonomous capabilities of agents in intelligent health-care environments, and the agents'...
详细信息
The configuration item values of each component within the autonomous driving system (ADS) are mutually constrained and complexly associated, which leads to problems such as configuration logic faults and memory overf...
详细信息
Brain tumor detection seeks to separate tumorous brain images and healthy images, which is considered to be the first step in diagnosis in order to maximize the likelihood of successful tumorous region detection accur...
详细信息
Latest advances in artificial intelligence (AI) have given upward push to automated mastering engines which can be capable of leveraging big quantities of records to become aware of and extract applicable information ...
详细信息
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...
详细信息
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracting usersto outsource data in the cloud. However, users outsource data directly via cloudstage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographicsolution in a cloud environment, and can be drawn up for access control by dataowners (DO) to define access policy. Unfortunately, an outsourced architectureapplied with attribute-based encryption introduces numerous challenges, including revocation. This issue is a threat to the data security of DO. Furthermore,highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes(revocation) storage identity-based encryption. Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming32 MB for 150-MB files.
Chronic Diseases are a very significant problem around the world. Manhandling medical cases often leads to significant repercussions in the treatment process and needs to be detected and dealt with early on. Unusual c...
详细信息
暂无评论