As a research hotspot in artificial intelligence in recent years, knowledge graphs have been applied to many fields in reality. However, with the increasingly diversified application scenarios of knowledge graphs, peo...
详细信息
The growth of digital technologies that enable the sharing of resources, underutilized assets, and services, is bringing new ways of shared consumption commonly called the "sharing economy"or "collabora...
详细信息
Traffic flow prediction becomes an essential process for intelligent transportation systems(ITS).Though traffic sensor devices are manually controllable,traffic flow data with distinct length,uneven sampling,and missi...
详细信息
Traffic flow prediction becomes an essential process for intelligent transportation systems(ITS).Though traffic sensor devices are manually controllable,traffic flow data with distinct length,uneven sampling,and missing data finds challenging for effective *** traffic data has been considerably increased in recent times which cannot be handled by traditional mathematical *** recent developments of statistic and deep learning(DL)models pave a way for the effectual design of traffic flow prediction(TFP)*** this view,this study designs optimal attentionbased deep learning with statistical analysis for TFP(OADLSA-TFP)*** presentedOADLSA-TFP model intends to effectually forecast the level of traffic in the *** attain this,the OADLSA-TFP model employs attention-based bidirectional long short-term memory(ABLSTM)model for predicting traffic *** order to enhance the performance of the ABLSTM model,the hyperparameter optimization process is performed using artificial fish swarm algorithm(AFSA).A wide-ranging experimental analysis is carried out on benchmark dataset and the obtained values reported the enhancements of the OADLSA-TFP model over the recent approaches mean square error(MSE),root mean square error(RMSE),and mean absolute percentage error(MAPE)of 120.342%,10.970%,and 8.146%respectively.
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie...
详细信息
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achieved secure outsourced computing,but they suffer from low computational accuracy,difficult-to-handle heterogeneous distribution of data from multiple sources,and high computational cost,which result in extremely poor user experience and expensive cloud computing *** address the above problems,we propose amulti-precision,multi-sourced,andmulti-key outsourcing neural network training ***,we design a multi-precision functional encryption computation based on Euclidean ***,we design the outsourcing model training algorithm based on a multi-precision functional encryption with multi-sourced ***,we conduct experiments on three *** results indicate that our framework achieves an accuracy improvement of 6%to 30%.Additionally,it offers a memory space optimization of 1.0×2^(24) times compared to the previous best approach.
A data center architecture can be determined as the basic structure of a cloud computing data center. However, the expected outcome cannot be obtained even though the tools, technologies, and elements are advanced. It...
详细信息
Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers’ (CSPs) ability to respond to client demands. In cloud market, the requests are announce...
详细信息
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete...
详细信息
In recent years, remote work has become a more popular option for companies across various industries. While remote work provides numerous benefits, such as flexibility and increased work-life balance, it also present...
详细信息
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio...
详细信息
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelization,but these were found to be insufficient in terms of robust privacy and performance.(p,l)-Angelization was successful against different privacy disclosures,but it was not *** the best of our knowledge,no robust privacy model based on fuzzy logic has been proposed to protect the privacy of sensitive attributes with multiple *** this paper,we suggest an improved version of(p,l)-Angelization based on a hybrid AI approach and privacy-preserving approach like ***-classification(p,l)-Angel uses artificial intelligence based fuzzy logic for classification,a high-dimensional segmentation technique for segmenting quasi-identifiers and multiple sensitive *** demonstrate the feasibility of the proposed solution by modelling and analyzing privacy violations using High-Level Petri *** results of the experiment demonstrate that the proposed approach produces better results in terms of efficiency and utility.
With the increasing reliance on Open Source software, users are exposed to third-party library vulnerabilities. software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA r...
详细信息
暂无评论