In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approa...
详细信息
Intrusion detection systems (IDS) are crucial in the identification of unauthorized activities on a digital network, enabling cybersecurity measures to initiate prevention protocols to protect the security of their ne...
详细信息
Seismic resistance systems for small and mid-span girder bridges often lacks hierarchically repeatable earthquake resistance, leading to challenging and time-consuming post-earthquake repairs. This research introduces...
详细信息
Seismic resistance systems for small and mid-span girder bridges often lacks hierarchically repeatable earthquake resistance, leading to challenging and time-consuming post-earthquake repairs. This research introduces a novel quasi-floating seismic resistance system (QFSRS) with hierarchically sacrificial components to enable multiple instances of earthquake resistance and swift post-earthquake restoration. Finite element modeling, a numerical probabilistic approach, and earthquake-simulating shake-table tests identified highly sensitive parameters from the QFSRS to establish theoretical equations describing the mechanical model and working mechanism of the system. The results indicate that the working mechanism of the QFSRS under seismic conditions aligns with the theoretical design, featuring four hierarchically sacrificial seismic stages. Specifically, under moderate (0.3g) or higher seismic conditions, QFSRS reduced relative displacement between piers and beams by 55.15% on average. The strain at pier bases increased 6.17% across all seismic scenarios, significantly enhancing bridge seismic performance. The QFSRS provides resilient and restorable earthquake resistance for girder bridges.
The procedure of segmenting a brain tumour is an essential step in the field of medical image processing. In order to improve the efficacy of disease treatment choices and the likelihood of patient survival, the timel...
详细信息
This paper presents a novel approach to optimise resource allocation in virtualised systems, aiming to maximise performance and minimise operational expenses. Leveraging deep learning models, specifically long-short-t...
详细信息
Effective data management is crucial in navigating any health crisis. With proper data management protocols in place, stakeholders can swiftly adapt to evolving circumstances during challenging times. A recent event l...
详细信息
In this paper, we propose a deep learning-based model, called Weight and Attention Network (WANet), for video summarization. The network comprises a simple multi-head attention mechanism, followed by a feed-forward ne...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Suicide represents a poignant societal issue deeply entwined with mental well-being. While existing research primarily focuses on identifying suicide-related texts, there is a gap in the advanced detection of mental h...
详细信息
暂无评论