Wireless nodes are one of the main components in different applications that are offered in a smart *** wireless nodes are responsible to execute multiple tasks with different priority *** the wireless nodes have limi...
详细信息
Wireless nodes are one of the main components in different applications that are offered in a smart *** wireless nodes are responsible to execute multiple tasks with different priority *** the wireless nodes have limited processing capacity,they offload their tasks to cloud servers if the number of tasks exceeds their task processing *** these tasks from remotely placed cloud servers causes a significant delay which is not required in sensitive task *** execution delay is reduced by placing fog computing nodes near these application nodes.A fog node has limited processing capacity and is sometimes unable to execute all the requested *** this work,an optimal task offloading scheme that comprises two algorithms is proposed for the fog nodes to optimally execute the time-sensitive offloaded *** first algorithm describes the task processing criteria for local computation of tasks at the fog nodes and remote computation at the cloud *** second algorithm allows fog nodes to optimally scrutinize the most sensitive tasks within their task *** results show that the proposed task execution scheme significantly reduces the execution time and most of the time-sensitive tasks are executed.
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** impl...
详细信息
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** implemented an Extended Kalman filter to create an activity recognition system *** proposed method applies an HSI color transformation in its initial stages to improve the clarity of the frame of the *** minimize noise,we use Gaussian *** of silhouette using the statistical *** use Binary Robust Invariant Scalable Keypoints(BRISK)and SIFT for feature *** next step is to perform feature discrimination using Gray *** that,the features are input into the Extended Kalman filter and classified into relevant human activities according to their definitive *** experimental procedure uses the SUB-Interaction and HMDB51 datasets to a 0.88%and 0.86%recognition rate.
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the ...
详细信息
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent *** a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in *** to traditional centralized machine learning,FL reduces communication overhead and improves privacy *** these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security *** paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for *** order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public *** addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy *** results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning *** the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of ***,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model *** enhancement effectively mitigates the threat of inference attacks on private information.
Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various *** resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain *** plays a crucial role in the diagn...
详细信息
Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various *** resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain *** plays a crucial role in the diagnosis of brain tumors and the examination of other brain ***,manual assessment of MRI images by radiologists or experts is performed to identify brain tumors and abnormalities in the early stages for timely ***,early diagnosis of brain tumors is intricate,necessitating the use of computerized *** research introduces an innovative approach for the automated segmentation of brain tumors and a framework for classifying different regions of brain *** proposed methods consist of a pipeline with several stages:preprocessing of brain images with noise removal based on Wiener Filtering,enhancing the brain using Principal Component Analysis(PCA)to obtain well-enhanced images,and then segmenting the region of interest using the Fuzzy C-Means(FCM)clustering technique in the third *** final step involves classification using the Support Vector Machine(SVM)*** classifier is applied to various types of brain tumors,such as meningioma and pituitary tumors,utilizing the Contrast-Enhanced Magnetic Resonance Imaging(CE-MRI)*** proposed method demonstrates significantly improved contrast and validates the effectiveness of the classification framework,achieving an average sensitivity of 0.974,specificity of 0.976,accuracy of 0.979,and a Dice Score(DSC)of ***,this method exhibits a shorter processing time of 0.44 s compared to existing *** performance of this method emphasizes its significance when compared to state-of-the-art methods in terms of sensitivity,specificity,accuracy,and *** enhance the method further in the future,it is feasible to standardize the approach by incorporating a set of classifiers to increase the robustness of the brain classi
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by patient *** third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer *** ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and *** using all three approaches have not been examined till *** researchers found that Machine Learning(ML)techniques can improve ECG *** study will compare popular machine learning techniques to evaluate ECG *** algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization *** plus prior knowledge has the highest accuracy(99%)of the four ML *** characteristics failed to identify signals without chaos *** 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
The world of digitization is growing exponentially;data optimization, security of a network, and energy efficiency are becoming more prominent. The Internet of Things (IoT) is the core technology of modern society. Th...
详细信息
暂无评论