作者:
Zhong, WenjieSun, TaoZhou, Jian-TaoWang, ZhuoweiSong, XiaoyuInner Mongolia University
College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology
School of Computer Science and Technology Guangzhou510006 China Portland State University
Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design...
详细信息
One of the leading causes of early health detriment is the increasing levels of air pollution in major cities and eventually in indoor spaces. Monitoring the air quality effectively in closed spaces like educational i...
详细信息
High levels of anger proneness can affect the individuals and others around them in the society. Anger proneness or the likelihood of experiencing anger in response to certain stimuli or situations is influenced by a ...
详细信息
Due to the disparity in the levels of difficulty presented by the several tasks, doing domain adaptation in an adversarial way may result in an imbalanced learning process. In the MNIST dataset, this phenomenon also m...
详细信息
Global trading is undergoing significant changes, necessitating modifications to the trading strategies. This study presents a newly developed cloud-based trading strategy that uses Amazon Web Services (AWS), machine ...
详细信息
Twitter is one of Indonesia's most widely used social media to express positive and negative emotions. Negative emotions are referred to as emotional reactivity, an example of which is depression. To detect emotio...
详细信息
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ...
详细信息
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati...
详细信息
Improvements in artificial intelligence and machine learning have led to the growing integration of face recognition technology for a wide range of applications, from security systems to social media. Three related us...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bitcoin,Ethereum,Filecoin,Hyperledger Fabric,BCOS,and BCS,current blockchain applications are still quite *** struggles with scenarios requiring high-speed transactions(e.g.,online markets)or large data storage(e.g.,video services)due to consensus efficiency *** restrictions pose risks to investors in blockchain-based economic systems(e.g.,DeFi),deterring current and potential *** protection challenges make it difficult to involve sensitive data in blockchain applications.
暂无评论