With the rapid proliferation of IoT (Internet of Things) technologies, ensuring reliable and continuous operation of M2M (machine to machine) communications has become paramount. This paper presents the design and imp...
详细信息
Physics-Informed Neural Networks (PINNs) have recently received increasing attention, however, optimizing the loss function of PINNs is notoriously difficult, where the landscape of the loss function is often highly n...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data *** social network data not only bring benefit for public health,disaster response,commercial promotion,and many other applications,but also give birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor...
详细信息
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing *** cloud is nowadays highly affected by internal threats of the *** applications such as banking,hospital,and business are more likely affected by real user *** intruder is presented as a user and set as a member of the *** becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or *** major issue in today's technological development is identifying the insider threat in the cloud *** data are lost,compromising cloud users is *** and security are not ensured,and then,the usage of the cloud is not *** solutions are available for the external security of the cloud ***,insider or internal threats need to be *** this research work,we focus on a solution for identifying an insider attack using the artificial intelligence *** insider attack is possible by using nodes of weak users’*** will log in using a weak user id,connect to a network,and pretend to be a trusted ***,they can easily attack and hack information as an insider,and identifying them is very *** types of attacks need intelligent solutions.A machine learning approach is widely used for security *** date,the existing lags can classify the attackers *** information hijacking process is very absurd,which motivates young researchers to provide a solution for internal *** our proposed work,we track the attackers using a user interaction behavior pattern and deep learning *** usage of mouse movements and clicks and keystrokes of the real user is stored in a *** deep belief neural
In UAV imagery, the intricate backgrounds combined with the high quantity and compact distribution of minute targets have consistently made target detection a formidable challenge in the realm of computer vision. This...
详细信息
The representation, measure, and handling of uncertainty in an application of deep learning have a significant impact on the performance of learning systems. Uncertainty is embedded in the entire process of learning f...
详细信息
Solar energy production has risen significantly globally in recent years. Solar Panels and Photovoltaic PV modules are the key components of solar energy production. Therefore, ensuring their health and efficiency and...
详细信息
With the rapid development of blockchain and the increasing computing power, the realization of the metaverse has become possible. However, there are not yet well-regulated and standardized industry standards for the ...
详细信息
This research-to-practice paper describes the development of an innovative practice aimed at addressing the global surge in student stress and related mental health challenges, particularly in engineering education. S...
详细信息
ISBN:
(纸本)9798350351507
This research-to-practice paper describes the development of an innovative practice aimed at addressing the global surge in student stress and related mental health challenges, particularly in engineering education. Student well-being is foundational to academic success, with studies indicating that dropout rates for students with stress are more than 50% and mental health problems can range as high as 83% in engineering education. Stress and elevated levels of inattention are associated with decreased academic interest, decision-making, self-efficacy, study skills, and GPA. Research has shown that stress levels can be reduced by meditation techniques and they induce attention. In this research, a three-stage guided meditation called ChakraMarmaKosha Meditation II (CM-II) was developed to improve the attention level of students. It involves past emotional cleansing, reviewing the day, visualizing the future components, and is accompanied by flute music that is composed based on a chosen Raga. In this study, a data analysis pipeline was developed for detailed spectral analysis to measure variations in attention due to meditation. In an in-person EEG experiment, a study group of 15 college students underwent this CM-II meditation process in a lab setting. The EEG spectral analysis underscored an enhancement in attentional focus post-meditation, as evidenced by key shifts in spectral ratios such as the notable decrease in Theta to Beta Ratio (TBR) and the surge in Theta to Gamma Ratio (TGR). The observed results were validated using attention scores from tests on the TestMyBrain tool. This study underscores the potential benefits of the CM-II meditation technique in fostering enhanced attention, reduced stress, and consequently improved academic performance in engineering education. While the current study provides promising results with CM-II meditation in enhancing attention, cognition, and relaxation, it's essential to acknowledge the limitations, such as the confin
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r...
详细信息
暂无评论