Context: Android games are gaining wide attention from users in recent years. However, the existing literature reports alarming statistics about banning popular and top-trending Android apps. The popular gaming apps h...
详细信息
Teachers take attendance by having pupils sign in or check-in classes and transportation. Student absences often result from individual mistakes. This article examines a technology that records data from classroom pho...
详细信息
Nowadays, Non-Intrusive Load Monitoring (NILM) with Federated Learning (FL) framework has become a growing study towards providing a secure energy disaggregation system in smart homes. This study aims at deploying an ...
详细信息
This article proposes a novel approach to traffic signal control that combines phase re-service with reinforcement learning (RL). The RL agent directly determines the duration of the next phase in a pre-defined sequen...
详细信息
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active...
详细信息
The pivotal role of white-box testing with respect to software quality assurance, necessitates dissemination of education materials related to white-box testing in the course curriculum. In this poster, we describe ou...
详细信息
The evolution of science and technology has led to increasingly complex cyber security threats, with advanced evasion techniques and encrypted communication channels making attacks harder to detect. While encryption h...
详细信息
The dynamic traveling salesman problem(DTSP)is significant in logistics distribution in real-world applications in smart cities,but it is uncertain and difficult to *** paper proposes a scheme library-based ant colony...
详细信息
The dynamic traveling salesman problem(DTSP)is significant in logistics distribution in real-world applications in smart cities,but it is uncertain and difficult to *** paper proposes a scheme library-based ant colony optimization(ACO)with a two-optimization(2-opt)strategy to solve the DTSP *** work is novel and contributes to three aspects:problemmodel,optimization framework,and ***,in the problem model,traditional DTSP models often consider the change of travel distance between two nodes over time,while this paper focuses on a special DTSP model in that the node locations change dynamically over ***,in the optimization framework,the ACO algorithm is carried out in an offline optimization and online application framework to efficiently reuse the historical information to help fast respond to the dynamic *** framework of offline optimization and online application is proposed due to the fact that the environmental change inDTSPis caused by the change of node location,and therefore the newenvironment is somehowsimilar to certain previous *** way,in the offline optimization,the solutions for possible environmental changes are optimized in advance,and are stored in a mode scheme *** the online application,when an environmental change is detected,the candidate solutions stored in the mode scheme library are reused via ACO to improve search efficiency and reduce computational ***,in the algorithm design,the ACO cooperates with the 2-opt strategy to enhance search *** evaluate the performance of ACO with 2-opt,we design two challenging DTSP cases with up to 200 and 1379 nodes and compare them with other ACO and genetic *** experimental results show that ACO with 2-opt can solve the DTSPs effectively.
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical images against impostors and *** this paper,an optical medical image security approach is *** is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and *** confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security ***,a comparative analysis is introduced between the suggested security approach and other conventional cryptography *** simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly *** has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
We propose a network service as a solution for video conference applications by constructing network layer routing strategies. Our approach takes into account the characteristics of conferencing flows, addresses vario...
详细信息
暂无评论