The smart city idea differs between cities and nations. In all meanings and characteristics of a smart city, public involvement is the only thing that remains common. Therefore, it is a very significant field to study...
详细信息
Cloud computing is a archetype that permits users to access a shared pool of computing resources on an on-demand or pay-per-use basis. It offers numerous benefits to individuals and organizations, including significan...
详细信息
The rapid growth of subscription-based services in the telecom industry has led to a larger subscriber base for service vendors. However, customer churn, or the loss of clients, has become a critical issue for telecom...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge *** storage capacity of edge nodes close to users is *** should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging *** paper proposes a redundant data detection method that meets the privacy protection *** scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot *** has the same effect as zero-knowledge proof,and it will not reveal the privacy of *** addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the *** use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is *** feasibility of the scheme is proved through safety analysis and efficiency analysis.
Financial fraud is a rising problem that affects both organizations and people, necessitating cutting-edge solutions to lessen its effects. The majority of machine learning models used now in the field of fraud detect...
详细信息
This research explores the detection of Denial of Service (DoS) attacks using a machine learning approach. DoS attacks aim to make internet services unavailable, which negatively impacts individuals and organizations....
详细信息
The primary objective is to develop a robust system for precise object identification on retail shelves, accurate item counting, and product categorization through class detection. This multifaceted approach directly ...
详细信息
This research study aims to create a full time winner predictor program for Counter-Strike Global Offensive tournaments that can predict the round winner of the game being spectated. The algorithm creates accurate pre...
详细信息
Deep imbalanced regression (DIR), where the target values have a highly skewed distribution and are also continuous, is an intriguing yet under-explored problem in machine learning. While recent works have already sho...
详细信息
The growing number of medical images has led to radiologist burnout, which seriously impacts the radiologist's performance. To address the previously mentioned issue, an Auxiliary Signal Guided Knowledge (ASGK) mu...
详细信息
暂无评论