作者:
Mukesh, P.Jegatheesan, A.Saveetha University
Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Saveetha School of Engineering Chennai India
This study compares the Novel K-Nearest Neighbor's (KNN )algorithm's Local Forecast accuracy to the Decision Tree(DT) technique using meteorological data. This will be done by comparing the two predicting appr...
详细信息
The increasing resolution of PolSAR images makes it challenging to achieve satisfactory land cover classification performance with a single feature. Existing research considers combining multiple features to integrate...
详细信息
In this paper, we propose an online federated learning framework with massive random access, aiming to learn a sequence of global models using local data that are sequentially collected by massive edge devices. As onl...
详细信息
A molecule's 2D representation consists of its atoms, their attributes, and the molecule's covalent bonds. A 3D (geometric) representation of a molecule is called a conformer and consists of its atom types and...
详细信息
A molecule's 2D representation consists of its atoms, their attributes, and the molecule's covalent bonds. A 3D (geometric) representation of a molecule is called a conformer and consists of its atom types and Cartesian coordinates. Every conformer has a potential energy, and the lower this energy, the more likely it occurs in nature. Most existing machine learning methods for molecular property prediction consider either 2D molecular graphs or 3D conformer structure representations in isolation. Inspired by recent work on using ensembles of conformers in conjunction with 2D graph representations, we propose E(3)-invariant molecular conformer aggregation networks. The method integrates a molecule's 2D representation with that of multiple of its conformers. Contrary to prior work, we propose a novel 2D-3D aggregation mechanism based on a differentiable solver for the Fused Gromov-Wasserstein Barycenter problem and the use of an efficient conformer generation method based on distance geometry. We show that the proposed aggregation mechanism is E(3) invariant and propose an efficient GPU implementation. Moreover, we demonstrate that the aggregation mechanism helps to significantly outperform state-of-the-art molecule property prediction methods on established datasets. Our implementation is available at this link. Copyright 2024 by the author(s)
Monkeypox, a zoonotic viral infection, has emerged as a global health concern. Early and accurate diagnosis is crucial for effective containment. This research investigates the application of Convolutional Neural Netw...
详细信息
At present, technological systems lack a secure and transparent method for tracking goods and preventing theft in e-commerce, leading to trust issues and data vulnerabilities. There is a pressing need for a comprehens...
详细信息
The accurate classification of quantum states is crucial for advancing quantum computing, as it allows for the effective analysis and correct functioning of quantum devices by analyzing the statistics of the data from...
详细信息
The accurate classification of quantum states is crucial for advancing quantum computing, as it allows for the effective analysis and correct functioning of quantum devices by analyzing the statistics of the data from quantum measurements. Traditional supervised methods, which rely on extensive labeled measurement outcomes, are used to categorize unknown quantum states with different properties. However, the labeling process demands computational and memory resources that increase exponentially with the number of qubits. We propose SSL4Q, manage to achieve (for the first time) semi-supervised learning specifically designed for quantum state classification. SSL4Q’s architecture is tailored to ensure permutation invariance for unordered quantum measurements and maintain robustness in the face of measurement uncertainties. Our empirical studies encompass simulations on two types of quantum systems: the Heisenberg Model and the Variational Quantum Circuit (VQC) Model, with system size reaching up to 50 qubits. The numerical results demonstrate SSL4Q’s superiority over traditional supervised models in scenarios with limited labels, highlighting its potential in efficiently classifying quantum states with reduced computational and resource overhead. Copyright 2024 by the author(s)
We have known artificial intelligence, deep learning models can be trained with a certain type of input format to perform a task e.g., OCR models takes input in the form of image to read the text characters from the i...
详细信息
Economic and technological progress in the cloud are the main topics of this article. The essay examines the question of whether or not it makes financial sense to build software in the cloud, vs in-house. This resear...
详细信息
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself...
详细信息
ISBN:
(纸本)9798350375442
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself. Healthcare, the military, sports, and remote treatment are just a few of the modern WBSN applications. It improves people's quality of life by allowing for more precise and quicker disease diagnosis as well as more timely care and more effective treatment. Even if a patient is far away from medical care, WBSN can still save their life. Despite the numerous benefits that WBSN technology brings to healthcare systems, there are legitimate concerns about security and privacy when it comes to collecting and transmitting physiological data about humans in an open setting. Ensuring the security of physiological data during transmission in a wireless environment is a challenging but crucial task. Key distribution, authentication, data integrity, and data confidentiality are just a few of the many security issues plaguing the WBSN. In tackling the WBSN security issues, this research contributes significantly. Secure transmission in wireless networks and high attack resistance are both provided by the cryptographic computational process. Nevertheless, the unsecure transmission of keys across networks is the sole vulnerability of public and private key cryptography methods. Attackers can easily crack traditional key sharing protocols used by communicating parties. Intruders can compromise the system's security in its entirety if they obtain the secret key. In WBSN, a secure way to generate and distribute secret keys is required. The EBB84QCP is a method for creating and sharing secret keys between communicating parties. Rather than using two prime numbers, the Enhanced and Modified RSA Cryptosystem (EMRSACS) suggests using four prime numbers for key generation, encryption, and decryption. data transmission in wireless networks still involves a secret quantum key that is
暂无评论