The Zero Trust security architecture has been widely recognized for its efficacy in strengthening cybersecurity by rejecting the concept of implicit trust and adopting strict identity verification measures. However, a...
详细信息
Language-based text provide valuable insights into people’s lived experiences. While traditional qualitative analysis is used to capture these nuances, new paradigms are needed to scale qualitative research effective...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Multimodal domain adaptation (MMDA) aims to transfer knowledge across different domains that contain multimodal data. Current methods typically assume that both the source and target domains have paired multimodal dat...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
Federated Learning (FL) has emerged as a promising training framework that enables a server to effectively train a global model by coordinating multiple devices, i.e., clients, without sharing their raw data. Keeping ...
详细信息
As a key communication technology in IEEE 802.15.4, Time Slot Channel Hopping (TSCH) enhances transmission reliability and interference immunity by scheduling of time slots and channel assignments. This paper presents...
详细信息
Human Action Recognition (HAR) has widespread applications in areas such as human-computer interaction, elderly care, and home healthcare. However, current sensor-based HAR faces challenges of low fine-grained recogni...
详细信息
AI(Artificial Intelligence)workloads are proliferating in modernreal-time *** the tasks of AI workloads fluctuate over time,resourceplanning policies used for traditional fixed real-time tasks should be *** particular...
详细信息
AI(Artificial Intelligence)workloads are proliferating in modernreal-time *** the tasks of AI workloads fluctuate over time,resourceplanning policies used for traditional fixed real-time tasks should be *** particular,it is difficult to immediately handle changes inreal-time tasks without violating the deadline *** cope with thissituation,this paper analyzes the task situations of AI workloads and findsthe following two ***,resource planning for AI workloadsis a complicated search problem that requires much time for ***,although the task set of an AI workload may change over time,thepossible combinations of the task sets are known in *** on theseobservations,this paper proposes a new resource planning scheme for AIworkloads that supports the re-planning of *** of generatingresource plans on the fly,the proposed scheme pre-determines resourceplans for various combinations of ***,in any case,the workload isimmediately executed according to the resource plan ***,the proposed scheme maintains an optimized CPU(Central Processing Unit)and memory resource plan using genetic algorithms and applies it as soonas the workload *** proposed scheme is implemented in the opensourcesimulator SimRTS for the validation of its *** show that the proposed scheme reduces the energy consumptionof CPU and memory by 45.5%on average without deadline misses.
Sentiment Analysis deals with consumer reviews available on blogs,discussion forums,E-commerce websites,andApp *** online reviews about products are also becoming essential for consumers and companies as *** rely on t...
详细信息
Sentiment Analysis deals with consumer reviews available on blogs,discussion forums,E-commerce websites,andApp *** online reviews about products are also becoming essential for consumers and companies as *** rely on these reviews to make their decisions about products and companies are also very interested in these reviews to judge their products and *** reviews are also a very precious source of information for requirement *** companies and consumers are not very satisfied with the overall sentiment;they like fine-grained knowledge about consumer *** to this,many researchers have developed approaches for aspect-based sentiment *** existing approaches concentrate on explicit aspects to analyze the sentiment,and only a few studies rely on capturing implicit *** paper proposes a Keywords-Based Aspect Extraction method,which captures both explicit and implicit *** also captures opinion words and classifies the sentiment about each *** applied semantic similarity-basedWordNet and SentiWordNet lexicon to improve aspect *** used different collections of customer reviews for experiment purposes,consisting of eight datasets over seven *** compared our approach with other state-of-the-art approaches,including Rule Selection using Greedy Algorithm(RSG),Conditional Random Fields(CRF),Rule-based Extraction(RubE),and Double Propagation(DP).Our results have shown better performance than all of these approaches.
暂无评论