Vehicular networks must support connection ubiquity and high levels of services for a large number of vehicles. In vehicular networks, mobile edge computing (MEC) is considered a viable technique, utilizing computing ...
详细信息
Stock price prediction is a challenging and promising area of research due to the volatile nature of stock markets influenced by factors like investor sentiment and market rumours. Developing accurate prediction model...
详细信息
The advent of Healthcare 5.0 heralds a groundbreaking revolution in digital healthcare, superseding the achievements of its predecessor, Healthcare 4.0. Integrating cutting-edge technologies such as the Internet of Me...
详细信息
The advent of Healthcare 5.0 heralds a groundbreaking revolution in digital healthcare, superseding the achievements of its predecessor, Healthcare 4.0. Integrating cutting-edge technologies such as the Internet of Medical Things (IoMT), smart wearables, and the extraordinary capabilities of Artificial Intelligence (AI), Healthcare 5.0 envisions a unified framework that grants seamless access to health records, fosters interconnectedness among individuals, resources, and institutions, and empowers intelligent responses to medical concerns. However, the realization of Healthcare 5.0 faces a significant challenge in the form of high-speed data transmission using smart devices. Conventional AI approaches relying on centralized data processing raise compelling concerns surrounding information privacy and scalability within the Healthcare 5.0 context. Amidst this backdrop, federated learning emerges as a beacon of hope, offering a decentralized AI paradigm that facilitates on-device machine learning without compromising end-user privacy through centralized data export. Safeguarding data integrity, federated learning holds the key to unlocking the full potential of Healthcare 5.0. In this pioneering study, we conduct an extensive survey, exploring the transformative implications of federated learning within the realm of Healthcare 5.0. By shedding light on recent advancements tailored to this paradigm, we delve into the fundamental concepts of resource-awareness, privacy preservation, incentivization, and personalization, all within the framework of federated learning. Moreover, we meticulously scrutinize key parameters including security, sparsification, quantization, robustness, scalability, and privacy, providing an authentic evaluation of the current progress in federated learning for Healthcare 5.0. This comprehensive survey serves as an indispensable cornerstone for the evolution of Healthcare 5.0, offering invaluable insights into its unique requirements and untapp
This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achi...
详细信息
This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achieve the optimization o players' objective functions while restricting their actions within required non-empty, convex and compact domains. In addition, a leader-following consensus protocol, in which quantized informa tion flows are utilized, is employed for information sharing among players. More specifically, logarithmic quantizers and uniform quantizers are investigated under both undirected and connected communication graphs and strongly connected digraphs, respec tively. Through Lyapunov stability analysis, it is shown that play ers' actions can be steered to a neighborhood of the Nash equilib rium with logarithmic and uniform quantizers, and the quanti fied convergence error depends on the parameter of the quan tizer for both undirected and directed cases. A numerical exam ple is given to verify the theoretical results.
To ensure a safe and pleasant user experience while watching content on YouTube, it is necessary to identify and classify inappropriate content, especially content that is inappropriate for children. In this work, we ...
详细信息
Informal settlements are becoming increasingly common in the global south, and their locations are often inaccurately represented in government statistics and maps. In remote sensing (RS), classifying informal settlem...
详细信息
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) can expand the coverage of mobile edge computing (MEC) services by reflecting and transmitting signals simultaneously, enabling ...
详细信息
This research aims to integrate IoT with blockchain technology to securely manage and monitor sensitive patient health data in critical care environments, thereby improving the reliability and efficiency of patient mo...
详细信息
作者:
Indumathi, V.Ashokkumar, C.School of Computing
College of Engineering and Technology Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur Chennai India
This research presents an innovative deep learning-based predictive maintenance model designed for smart automotive systems, utilizing the EnsembleAE-Boost (EAE-Boost) algorithm. The primary objective of the proposed ...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
暂无评论