The growing number of networked devices and complex network infrastructures necessitates robust network security measures. Network intrusion detection systems are crucial for identifying and mitigating malicious activ...
详细信息
Data manipulation functionalities (DMFs) refer to operations such as create, read, update and delete which are crucial for maintaining the integrity of Android application (app) data. Existing testing techniques often...
详细信息
Breast cancer prognosis prediction is pivotal to improving the survival chances of breast cancer patients. Recently, deep learning models integrated with multi-modal data have been explored extensively to improve the ...
Breast cancer prognosis prediction is pivotal to improving the survival chances of breast cancer patients. Recently, deep learning models integrated with multi-modal data have been explored extensively to improve the reliability and accuracy of breast cancer prognosis prediction. However, multi-modal data poses challenges to feature extraction due to the varied distribution and dimensionality across the modalities. To address this, we developed a multi-input convolutional neural network model, which extracts features from each modality in the multi-modal dataset simultaneously using separate convolutional layers, then concatenates and passes them to shared dense layers. The proposed model achieved area under the receiver operating characteristic curve values of 0.893 and 0.865 in 5-fold cross-validation and unseen test data respectively (at threshold = 0.2). These outcomes surpassed those of single-input convolutional neural network models and a state-of-the-art method based on multi-modal data. The multi-input convolutional neural network model efficiently handles multi-modal data and is a promising tool for breast cancer prognosis prediction.
作者:
Li, AngHamzah, RaseedaGao, YoushengJiujiang Vocational University
College of Information Engineering Jiangxi Jiujiang332000 China
College of Computing Informatics and Mathematics Selangor Shah Alam40450 Malaysia Melaka
College of Computing Informatics and Mathematics Jasin Melaka77300 Malaysia
Underwater sonar imagery is characterized by small target sizes and low resolution, which can result in detection failures or false positives. To counteract these challenges, we introduce the underwater sonar detectio...
详细信息
Our approach leverages the massive parallelism and computational power of a modern Graphics Processing Unit (GPU) to accelerate CRYSTALS-Dilithium's key operations. While post-quantum cryptographic algorithms like...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Our approach leverages the massive parallelism and computational power of a modern Graphics Processing Unit (GPU) to accelerate CRYSTALS-Dilithium's key operations. While post-quantum cryptographic algorithms like Dilithium offer robust security, they face computational challenges in high-throughput scenarios. Dilithium's performance bottlenecks, particularly in polynomial arithmetic and random sampling, have limited its practical deployment. To address these challenges, we leverage GPU acceleration as a promising solution to enhance efficiency. Our approach develops novel GPU-centric algorithms and data structures tailored to Dilithium's requirements. We focus on optimizing Number Theoretic Transforms (NTT), poly-nomial arithmetic, and random sampling, with an emphasis on batch processing and efficient memory management to maximize throughput. Experimental results demonstrate significant performance improvements over existing implementations. Our GPU-accelerated version consistently outperforms reference implemen-tations, achieving speed-ups ranging from 53.7% to 59.9% for signature generation and 20.0% to 63.8% for verification across various security levels. These results highlight the potential of our approach in enabling efficient post-quantum cryptography for high-performance applications.
Dataflow high-level synthesis (HLS) tools automatically map a high-level software program to a dataflow hardware design. When testing the design, the HLS tool takes a testing function written in the same software lang...
详细信息
The Fourth Industrial Revolution (IR4.0) has transformed various sectors, including cultural heritage preservation, education, and tourism, through advanced technologies like virtual reality (VR). This study explores ...
详细信息
ISBN:
(纸本)9791188428137
The Fourth Industrial Revolution (IR4.0) has transformed various sectors, including cultural heritage preservation, education, and tourism, through advanced technologies like virtual reality (VR). This study explores the intersection of technology and cultural heritage learning, highlighting the crucial role of user experience (UX) in VR applications. While VR holds significant potential for cultural heritage learning, existing research often emphasizes utility and usability over UX. To address this gap, the study evaluates the UX of VR applications designed for cultural heritage, specifically focusing on the Istana Jahar historical site. The objectives include assessing dimensions such as effectiveness, efficiency, attractiveness, satisfaction, emotion, engagement, attention, and perception. The research employs quantitative methods using the Design Science Research Methodology (DSRM) to guide the development and evaluation of the VR application. A cluster random sampling technique was used to recruit 113 students from Universiti Malaysia Kelantan (UMK), ensuring a representative sample with relevant educational backgrounds. Participants interacted with the VR application and completed a survey based on the developed conceptual framework. Findings indicate high mean scores across UX dimensions: Effectiveness (4.487), Efficiency (4.363), Attractiveness (4.528), Satisfaction (4.363), Emotion (4.401), Engagement (4.385), Attention (4.366), and Perception (4.416). These results demonstrate that the elements within the conceptual framework effectively enhance the UX in cultural heritage learning applications. Copyright 2025 Global IT Research Institute (GIRI). All rights reserved.
The rapid growth of data generated by Internet of Things (IoT) devices necessitates the development of advanced computational frameworks that can efficiently handle real-time data processing. Traditional cloud and edg...
详细信息
ISBN:
(数字)9798331505745
ISBN:
(纸本)9798331505752
The rapid growth of data generated by Internet of Things (IoT) devices necessitates the development of advanced computational frameworks that can efficiently handle real-time data processing. Traditional cloud and edge computing systems, while effective, face significant challenges, including high latency, limited computational resources, and data transfer bottlenecks. To address these issues, this study introduces a hybrid approach that integrates quantum computing into the edge-cloud continuum. The proposed method utilizes Quantum- Neural Networks (QNNs) in conjunction with local edge processing, leveraging quantum autoencoders for feature compression, and incorporating fully decentralized edge computing with quantum processors to enhance data processing capabilities. Additionally, a hybrid model combining QNNs with classical machine learning techniques is implemented at the edge for improved classification accuracy. The proposed system's performance is evaluated through extensive experiments across multiple datasets, comparing the results of quantum-based models with traditional classical and hybrid approaches. The results show a significant improvement in classification accuracy, reduced feature compression time, and enhanced processing efficiency, particularly in resource-constrained environments. The results underscore the potential of quantum machine learning in real-time, large-scale applications, marking an important step toward the practical integration of quantum computing in distributed computing systems.
Ahstract- The healthcare sector faces significant challenges in balancing adaptability, security, and resource efficiency in medi-cal file management. This paper introduces a lightweight protocol that optimizes crypto...
详细信息
ISBN:
(数字)9798331507695
ISBN:
(纸本)9798331507701
Ahstract- The healthcare sector faces significant challenges in balancing adaptability, security, and resource efficiency in medi-cal file management. This paper introduces a lightweight protocol that optimizes cryptographic components for using ephemeral key encapsulation, combining adaptive Challenge Response Pair with robust error correction. Designed for limited resource environments, the proposed approach minimizes computational overhead, ensures reliable key recovery, and provides privacy protection. The execution results validate its performance, making it a practical solution for a decentralized healthcare system.
This study examines the essential importance of security in contemporary network settings, emphasizing the increasing dependence on Virtual Private Networks (VPNs) for safe data transfer. The emphasis is on assessing ...
详细信息
暂无评论