Emotion and stress expression are deeply intertwined. Analyzing blog data from social network platforms reveals that specific emotions often appear simultaneously with expressions indicating stress, and emotional expr...
详细信息
Solar module prices have dramatically dropped in recent years, which in turn has facilitated distributed solar energy resources (DSERs) in smart grids. To manage electricity real time supply and demand, the utilities ...
详细信息
Trustworthiness and product traceability are essential factors in the apparel industry 4.0 for establishing successful business relationships among stakeholders such as customers,manufacturers,suppliers,and *** stakeh...
详细信息
Trustworthiness and product traceability are essential factors in the apparel industry 4.0 for establishing successful business relationships among stakeholders such as customers,manufacturers,suppliers,and *** stakeholder has implemented different technology-based systems to record and track product ***,these systems work in silos,and there is no intra-system communication,leading to a lack of complete supply chain traceability for all apparel ***,apparel stakeholders are reluctant to share their business information with business competitors;thus,they involve third-party auditors to ensure the quality of the final ***,the apparel manufacturing industry faces challenges with counterfeit products,making it difficult for consumers to determine the authenticity of the ***,in this paper,a trustworthy apparel product traceability framework called ChainApparel is developed using the Internet of Things(IoT)and blockchain to address these challenges of authenticity and traceability of apparel ***,multiple smart contracts are designed and developed for registration,process execution,audit,fault,and product traceability to authorize,validate,and trace every business transaction among the apparel ***,the real-time performance analysis of ChainApparel is carried out regarding transaction throughput and latency by deploying the compute nodes at different geographical locations using Hyperledger *** results conclude that ChainApparel accomplished significant performance under diverse workloads while ensuring complete traceability along the complex supply chain of the apparel ***,the ChainApparel framework helps make the apparel product more trustworthy and transparent in the market while safeguarding trust among the industry stakeholders.
This study introduces an IoT-enabled robotic arm system designed to improve water quality monitoring in aquaculture. The main goal is to automate the process and enhance the reliability and efficiency of monitoring cr...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
We have been developing MEIMAT (MEiji Microprocessor Architecture Design Tools). The MEIMAT is essentially designed to be able to represent any instruction of various processors by the MEIMAT meta-instruction in two w...
详细信息
Fatigue driving is considered to be one of the main factors causing traffic accidents, so fatigue driving detection technology has an important role in road safety. Currently, EEG-based detection is one of the most in...
详细信息
In the dynamic domain of supply chain management, integrating Radio-Frequency Identification (RFID) technology with blockchain technology represents a significant leap forward. This integration has created a blockchai...
详细信息
Originating from the diffusion phenomenon in physics that describes particle movement, the diffusion generative models inherit the characteristics of stochastic random walk in the data space along the denoising trajec...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
暂无评论