The multiple-input–multiple-output nonlinear system (MIMO-NS) is a hot research topic in various science and application fields. To solve the tracking control (TC) problem of MIMO-NS effectively, a zeroing neuro-PID ...
详细信息
Machine learning models are the backbone of smart grid optimization, but their effectiveness hinges on access to vast amounts of training data. However, smart grids face critical communication bottlenecks due to the e...
详细信息
Label enhancement (LE) is still a challenging task to mitigate the dilemma of the lack of label distribution. Existing LE work typically focuses on primarily formulating a projection between feature space and label di...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,information leakage,or weak *** address these issues,this study proposes a universal and adaptable image-hiding ***,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image ***,to improve perceived human similarity,perceptual loss is incorporated into the training *** experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality ***,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at ***,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
With the continuous development of China's financial market and the gradual improvement of the financial system, investors are increasingly interested in participating in investments. At the same time, there is a ...
详细信息
Healthcare is a fundamental part of every individual’s *** healthcare industry is developing very rapidly with the help of advanced *** researchers are trying to build cloud-based healthcare applications that can be ...
详细信息
Healthcare is a fundamental part of every individual’s *** healthcare industry is developing very rapidly with the help of advanced *** researchers are trying to build cloud-based healthcare applications that can be accessed by healthcare professionals from their premises,as well as by patients from their mobile devices through communication *** systems promote reliable and remote interactions between patients and healthcare ***,there are several limitations to these innovative cloud computing-based systems,namely network availability,latency,battery life and resource *** propose a hybrid mobile cloud computing(HMCC)architecture to address these ***,we also evaluate the performance of heuristic and dynamic machine learning based task scheduling and load balancing algorithms on our proposed *** compare them,to identify the strengths and weaknesses of each algorithm;and provide their comparative results,to show latency and energy consumption *** issues for cloudbased healthcare systems are discussed in detail.
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control *** on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and ***,many security protocols have been presented to offer privacy and security ***,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information *** last attack can be launched upon adversarial physical capture of these *** addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high *** this paper,an authentication protocol based on lightweight quadratic residues and hash functions is *** formal security analysis is executed using the widely deployed random oracle *** addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat *** terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related ***,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage *** overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
Conventional machine learning methods for software effort estimation (SEE) have seen an increase in research interest. Conversely, there are few research that try to evaluate how well deep learning techniques work in ...
详细信息
1 *** Activity Recognition(GAR),which aims to identify activities performed collectively in videos,has gained significant attention *** conventional action recognition centered on single individuals,GAR explores the c...
详细信息
1 *** Activity Recognition(GAR),which aims to identify activities performed collectively in videos,has gained significant attention *** conventional action recognition centered on single individuals,GAR explores the complex interactions between multiple individuals.
暂无评论