This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
Brain hemorrhage is a serious and life-threatening condition. It cancause permanent and lifelong disability even when it is not fatal. The wordhemorrhage denotes leakage of blood within the brain and this leakage ofbl...
详细信息
Brain hemorrhage is a serious and life-threatening condition. It cancause permanent and lifelong disability even when it is not fatal. The wordhemorrhage denotes leakage of blood within the brain and this leakage ofblood from capillaries causes stroke and adequate supply of oxygen to thebrain is hindered. Modern imaging methods such as computed tomography(CT) and magnetic resonance imaging (MRI) are employed to get an idearegarding the extent of the damage. An early diagnosis and treatment can savelives and limit the adverse effects of a brain hemorrhage. In this case, a deepneural network (DNN) is an effective choice for the early identification andclassification of brain hemorrhage for the timely recovery and treatment of anaffected person. In this paper, the proposed research work is divided into twonovel approaches, where, one for the classification and the other for volumecalculation of brain hemorrhage. Two different datasets are used for twodifferent techniques classification and volume. A novel algorithm is proposedto calculate the volume of hemorrhage using CT scan images. In the firstapproach, the ‘RSNA’ dataset is used to classify the brain hemorrhage typesusing transfer learning and achieved an accuracy of 93.77%. Furthermore,in the second approach, a novel algorithm has been proposed to calculate thevolume of brain hemorrhage and achieved tremendous results as 1035.91mm3and 9.25 cm3, using the PhysioNet CT scan tomography dataset.
Virtual Reality (VR) technology has the potential to enhance education by providing immersive and engaging learning experiences that can improve teaching and learning outcomes. While there is a growing interest in uti...
详细信息
Sign language serves as a vital mode of communication for the deaf and hard of hearing community, yet access to sign language content remains limited due to the lack of accurate and timely captioning. In this paper, a...
详细信息
This project aimed to implement a prototype capable of real-time monitoring and control of various parameters in information management setting with Internet of Things (IoT). Research methodology involved designing an...
详细信息
Domain adaptation aims to transfer knowledge from the labeled source domain to an unlabeled target domain that follows a similar but different ***,adversarial-based methods have achieved remarkable success due to the ...
详细信息
Domain adaptation aims to transfer knowledge from the labeled source domain to an unlabeled target domain that follows a similar but different ***,adversarial-based methods have achieved remarkable success due to the excellent performance of domain-invariant feature presentation ***,the adversarial methods learn the transferability at the expense of the discriminability in feature representation,leading to low generalization to the target *** this end,we propose a Multi-view Feature Learning method for the Over-penalty in Adversarial Domain ***,multi-view representation learning is proposed to enrich the discriminative information contained in domain-invariant feature representation,which will counter the over-penalty for discriminability in adversarial ***,the class distribution in the intra-domain is proposed to replace that in the inter-domain to capture more discriminative information in the learning of transferrable *** experiments show that our method can improve the discriminability while maintaining transferability and exceeds the most advanced methods in the domain adaptation benchmark datasets.
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...
详细信息
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingt
暂无评论