Using large language model to generate vehicle type recognition algorithm can reduce the burden of developers and realize the rapid development of projects. In this paper, LangChain large model interface provided by B...
详细信息
Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so an accurate phishing detection system is required. Therefore, many phishing detection techniques have been proposed as well as ...
详细信息
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
In recent years, the proliferation of LEO (Low-Earth Orbit) satellites and the accumulation of space debris have made Near-Earth space more and more crowded, and hence significantly increased the risk of collisions in...
详细信息
The novel Coronavirus (COVID-19) spread rapidly around the world and caused overwhelming effects on the health and economy of the world. It first appeared in Wuhan city of China and was declared a pandemic by the Worl...
详细信息
Sentiment Analysis deals with consumer reviews available on blogs,discussion forums,E-commerce websites,andApp *** online reviews about products are also becoming essential for consumers and companies as *** rely on t...
详细信息
Sentiment Analysis deals with consumer reviews available on blogs,discussion forums,E-commerce websites,andApp *** online reviews about products are also becoming essential for consumers and companies as *** rely on these reviews to make their decisions about products and companies are also very interested in these reviews to judge their products and *** reviews are also a very precious source of information for requirement *** companies and consumers are not very satisfied with the overall sentiment;they like fine-grained knowledge about consumer *** to this,many researchers have developed approaches for aspect-based sentiment *** existing approaches concentrate on explicit aspects to analyze the sentiment,and only a few studies rely on capturing implicit *** paper proposes a Keywords-Based Aspect Extraction method,which captures both explicit and implicit *** also captures opinion words and classifies the sentiment about each *** applied semantic similarity-basedWordNet and SentiWordNet lexicon to improve aspect *** used different collections of customer reviews for experiment purposes,consisting of eight datasets over seven *** compared our approach with other state-of-the-art approaches,including Rule Selection using Greedy Algorithm(RSG),Conditional Random Fields(CRF),Rule-based Extraction(RubE),and Double Propagation(DP).Our results have shown better performance than all of these approaches.
Owing to the challenge of target occlusion leading to tracking failure during the target tracking process, achieving efficient and robust tracking of targets under occlusion scenarios has become a focal point of resea...
详细信息
The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industria...
详细信息
The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industrial monitoring,transportation,and smart *** and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of *** paper presents a traffic-aware,cluster-based,and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such *** proposed protocol divides the network into clusters where optimal cluster heads are selected among super and normal nodes based on their residual *** protocol considers multi-criteria attributes,i.e.,energy,traffic load,and distance parameters to select the next hop for data delivery towards the base *** performance of the proposed protocol is evaluated through the network simulator *** different traffic rates,number of nodes,and different packet sizes,the proposed protocol outperformed LoRaWAN in terms of end-to-end packet delivery ratio,energy consumption,end-to-end delay,and network *** 100 nodes,the proposed protocol achieved a 13%improvement in packet delivery ratio,10 ms improvement in delay,and 10 mJ improvement in average energy consumption over LoRaWAN.
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...
详细信息
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingt
暂无评论