A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p...
详细信息
Recent advances in multi-unmanned aerial vehicle (UAV) based federated learning do not take into consideration the massive computational requirements of modern deep learning models on mobile UAV s. Additionally, there...
详细信息
ISBN:
(数字)9798331536015
ISBN:
(纸本)9798331536022
Recent advances in multi-unmanned aerial vehicle (UAV) based federated learning do not take into consideration the massive computational requirements of modern deep learning models on mobile UAV s. Additionally, there has been significant progress that shows that the information transmitted between the federated agent and the central hub can be attacked to undermine the privacy of the data. We propose a novel multi-UAV-based federated transfer learning system that drastically reduces the computational burden overall, shifts it from UAV s to the ground fusion center, and reduces the bandwidth requirements while enhancing its secure nature. The proposed system makes multi-UAV learning significantly fast, reliable, power efficient, and practically feasible. Furthermore, we provide simulation and experimental results to demonstrate the effectiveness of the proposed system.
Scientific experimentation, a cornerstone of human progress, demands rigor in reliability, methodical control, and interpretability to yield meaningful results. Despite the growing capabilities of large language model...
详细信息
LLMs’ sources of knowledge are data snapshots containing factual information about entities collected at different timestamps and from different media types (e.g. wikis, social media, etc.). Such unstructured knowled...
详细信息
We consider a plasma that is created by a high voltage difference $$\lambda $$ , which is known as a Townsend discharge. We consider it to be confined to the region $$\Omega $$ between two concentric spheres, two conc...
We consider a plasma that is created by a high voltage difference $$\lambda $$ , which is known as a Townsend discharge. We consider it to be confined to the region $$\Omega $$ between two concentric spheres, two concentric cylinders, or more generally between two star-shaped surfaces. We first prove that if the plasma is initially relatively dilute, then either it may remain dilute for all time or it may not, depending on a certain parameter $$\kappa (\lambda , \Omega )$$ . Secondly, we prove that there is a connected one-parameter family of steady states. This family connects the non-ionized gas to a plasma, either with a sparking voltage $$\lambda ^*$$ or with very high ionization, at least in the cylindrical or spherical cases.
This paper examines the specific obstacles of constructing Retrieval-Augmented Generation (RAG) systems in low-resource languages, with a focus on Persian’s complicated morphology and versatile syntax. The research a...
详细信息
This systematic review comprehensively examines the application and impacts of Educational Data Mining (EDM) over the past decade. It explores the use of various data mining tools and techniques, statistics, and machi...
详细信息
In forensic topical modelling, the a parameter controls the distribution of topics in documents. However, low, high, or incorrect values of a lead to topic sparsity, model overfitting, and suboptimal topic distributio...
详细信息
This paper investigates the growing role of steganography in cybersecurity and presents a hybrid implementation called Multi-level Discrete Cosine Convolution (MDCC) that applies a Multi-level Discrete Cosine Transfor...
详细信息
ISBN:
(数字)9798331523893
ISBN:
(纸本)9798331523909
This paper investigates the growing role of steganography in cybersecurity and presents a hybrid implementation called Multi-level Discrete Cosine Convolution (MDCC) that applies a Multi-level Discrete Cosine Transform (MDCT) and a Convolutional Neural Network (CNN). Steganography provides some advantages compared to cryptography, mainly its invisibility, but there are weaknesses in information capacity and resistance to attacks in traditional techniques. The paper suggests solving these difficulties with a new steganography method using deep learning. The proposed MDCC method provides an opportunity to encrypt large amounts of data in realistic images that are beyond human visual perception. The system is trained on the ImageNet dataset by using a loss function to balance the quality of the cover image and the information it conceals within it. The MDCC model proposed yields accurate results for all metrics since PSNR, SSIM, and bits per pixel come out to be 80.13dB, 0.9918, and 12.5 bpp, respectively.
暂无评论