Brain tumor classification and segmentation are crucial medical imaging procedures that aid in diagnosis and treatment planning. This study provides a detailed analysis of the methodologies and techniques used in this...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sen...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sensing and ***,the collision avoidance performance of CAVs with unexpected obstacles has not been studied in the existing *** this paper,we first design a platoon-based collision avoidance framework for *** this framework,we deploy a Digital Twin(DT)system at the head vehicle in a platoon to reduce communication overhead and decision-making delay based on a proposed trajectory planning *** addition,a DT-assistant system is deployed on the assistant vehicle to monitor vehicles out of the sensing range of the head vehicle for the maintenance of the DT *** this case,the transmission frequency of kinetic states of platoon members can be reduced to ensure low-overhead ***,we design a variable resource reservation interval that can ensure DT synchronization between DT and the assistant system with high *** further improve road safety,an urgency level-based trajectory planning algorithm is proposed to avoid unexpected obstacles considering different levels of emergency *** results show that our DT system-based scheme can achieve significant performance gains in unexpected obstacle *** to the existing schemes,it can reduce collisions by 95%and is faster by about 10%passing by the unexpected obstacle.
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around...
详细信息
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around sharing and discussing current events. Within these communities, users are enabled to share their opinions about each event. Using Sentiment Analysis to understand the polarity of each message belonging to an event, as well as the entire event, can help to better understand the general and individual feelings of significant trends and the dynamics on online social networks. In this context, we propose a new ensemble architecture, EDSAEnsemble (Event Detection Sentiment Analysis Ensemble), that uses Event Detection and Sentiment Analysis to improve the detection of the polarity for current events from Social Media. For Event Detection, we use techniques based on Information Diffusion taking into account both the time span and the topics. To detect the polarity of each event, we preprocess the text and employ several Machine and Deep Learning models to create an ensemble model. The preprocessing step includes several word representation models: raw frequency, TFIDF, Word2Vec, and Transformers. The proposed EDSA-Ensemble architecture improves the event sentiment classification over the individual Machine and Deep Learning models. Authors
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this...
详细信息
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this paper investigates the energy efficiency(EE)maximization problem for downlink cooperative non-orthogonal multiple access(C-NOMA)systems with hardware impairments(HIs).The base station(BS)communicates with several users via a half-duplex(HD)amplified-and-forward(AF)***,we formulate the EE maximization problem of the system under HIs by jointly optimizing transmit power and power allocated coefficient(PAC)at BS,and transmit power at the *** original EE maximization problem is a non-convex problem,which is challenging to give the optimal solution ***,we use fractional programming to convert the EE maximization problem as a series of subtraction form ***,variable substitution and block coordinate descent(BCD)method are used to handle the ***,a resource allocation algorithm is proposed to maximize the EE of the ***,simulation results show that the proposed algorithm outperforms the downlink cooperative orthogonal multiple access(C-OMA)scheme.
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient *** this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few ***,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each ***,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate *** when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start *** importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker ***,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
With the rapid development of urban rail transit,the existing track detection has some problems such as low efficiency and insufficient detection coverage,so an intelligent and automatic track detectionmethod based on...
详细信息
With the rapid development of urban rail transit,the existing track detection has some problems such as low efficiency and insufficient detection coverage,so an intelligent and automatic track detectionmethod based onUAV is urgently needed to avoid major safety *** the same time,the geographical distribution of IoT devices results in the inefficient use of the significant computing potential held by a large number of *** a result,the Dispersed Computing(DCOMP)architecture enables collaborative computing between devices in the Internet of Everything(IoE),promotes low-latency and efficient cross-wide applications,and meets users’growing needs for computing performance and service *** paper focuses on examining the resource allocation challenge within a dispersed computing environment that utilizes UAV inspection ***,the system takes into account both resource constraints and computational constraints and transforms the optimization problem into an energy minimization problem with computational *** Markov Decision Process(MDP)model is employed to capture the connection between the dispersed computing resource allocation strategy and the system ***,a method based on Double Deep Q-Network(DDQN)is introduced to derive the optimal ***,an experience replay mechanism is implemented to tackle the issue of increasing *** experimental simulations validate the efficacy of the method across various scenarios.
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Chann...
详细信息
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Channel State Information(CSI).In this paper,we formulate the problem of sum throughput maximization as a Mixed Integer Non-Linear Programming(MINLP)*** problem is solved in two stages:a tripartite graph-based resource allocation stage and a time-scale optimization *** proposed approach prioritizes maintaining Quality of Service(QoS)and resource allocation to minimize power consumption while maximizing sum *** results demonstrate the superiority of the proposed algorithm over standard benchmark *** of the proposed algorithm using performance parameters such as sum throughput shows improvements ranging from 17%to 93%.Additionally,the average time to deliver resources to CSI users is minimized by 60.83%through optimal power *** approach ensures QoS requirements are met,reduces system signaling overhead,and significantly increases D2D sum throughput compared to the state-of-the-art *** proposed methodology may be well-suited to address the challenges SIoT applications,such as home automation and higher education systems.
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and c...
详细信息
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and controllability, some researchershave introduced symmetric layouts along with thesetools. One popular strategy employs dynamical systemscompatible with symmetries that construct functionswith the desired symmetries. However, these aretypically confined to simple planar symmetries. Theother generates symmetrical patterns under theconstraints of tilings. Although it is slightly moreflexible, it is restricted to small ranges of tilingsand lacks textural variations. Thus, we proposed anew approach for generating aesthetic patterns bysymmetrizing quasi-regular patterns using general kuniformtilings. We adopted a unified strategy toconstruct invariant mappings for k-uniform tilings thatcan eliminate texture seams across the tiling ***, we constructed three types of symmetriesassociated with the patterns: dihedral, rotational, andreflection symmetries. The proposed method can beeasily implemented using GPU shaders and is highlyefficient and suitable for complicated tiling with regularpolygons. Experiments demonstrated the advantages of our method over state-of-the-art methods in terms offlexibility in controlling the generation of patterns withvarious parameters as well as the diversity of texturesand styles.
暂无评论