Introduction: Several types of cancer can be detected early through thermography, which uses thermal profiles to image tissues in recent years, thermography has gained increasing attention due to its non-invasive and ...
详细信息
作者:
Nazerfard, Ehsan
Department of Computer Engineering Amirkabir University of Technology Tehran Iran
One of the most important problems that arises during the knowledge discovery from data and data mining process in many new emerging technologies is mining data with temporal dependencies. One such application is acti...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled smart *** high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for ***,there is a high computation latency due to the presence of a remote cloud *** computing,which brings the computation close to the data source is introduced to overcome this *** an IoT-enabled smart city environment,one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay *** efficient resource allocation at the edge is helpful to address this *** this paper,an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation ***,we presented a three-layer network architecture for IoT-enabled smart ***,we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization *** Automata(LA)is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource *** extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
We formulate the generalized group technology concept in cellular manufacturing under two new assumptions. Each process routing is indexed by a level of quality and each pair of machines is indexed by a level of compa...
详细信息
Human activity recognition systems using wearable sensors is an important issue in pervasive computing, which applies to various domains related to healthcare, context aware and pervasive computing, sports, surveillan...
详细信息
In comparison to centralised organisations with a single location structure, multi-location organisations face more challenges in the management of maintenance scheduling. In this paper, we present a new mathematical ...
详细信息
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of ...
详细信息
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of life,conversational assistive technologies include speech recognition APIs,text-to-speech APIs and various communication tools that are *** real-time *** natural language processing(NLP)and machine learning algorithms,the technology analyzes spoken language and provides appropriate responses,offering an immersive experience through voice commands,audio feedback and vibration ***/methodology/approach:These technologies have demonstrated their ability to promote self-confidence and self-reliance in visually impaired individuals during social ***,they promise to improve social competence and foster better *** short,assistive technology in conversation stands as a promising tool that empowers the visually impaired individuals,elevating the quality of their social ***:The main benefit of assistive communication technology is that it will help visually impaired people overcome communication barriers in social *** technology helps them communicate effectively with acquaintances,family,co-workers and even strangers in public *** enabling smoother and more natural communication,it works to reduce feelings of isolation and increase overall quality of ***/value:Research findings include successful activity recognition,aligning with activities on which the VGG-16 model was trained,such as hugging,shaking hands,talking,walking,waving and *** originality of this study lies in its approach to address the challenges faced by the visually impaired individuals in their social interactions through modern *** adds to the body of knowledge in the area of assistive technologies,which contribute to the empowerment and social in
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
The transition from traditional energy or electrical grids to smart energy or electrical grids has significantly transformed energy management. This evolution emphasizes decentralization, efficiency, and sustainabilit...
详细信息
The transition from traditional energy or electrical grids to smart energy or electrical grids has significantly transformed energy management. This evolution emphasizes decentralization, efficiency, and sustainability in energy systems. However, it also introduces numerous risks, including cyber-physical system vulnerabilities and challenges in energy trading. The application of blockchain and Machine Learning (ML) offers potential solutions to these issues. Blockchain enhances energy transactions by making them safer, more transparent, and tamper-proof, while ML optimizes grid performance by improving predictions, fault detection, and anomaly identification. This systematic review examines the application of blockchain and ML in peer-to-peer (P2P) energy trading within smart grids and analyzes how these technologies complement each other in mitigating risks and enhancing the efficiency of smart grids. Blockchain enhances security by providing privacy for transactions and maintaining immutable records, while ML predicts market trends, identifies fraudulent activities, and ensures efficient energy use. The paper identifies critical challenges in smart grids, such as unsecured communication channels and vulnerabilities to cyber threats, and discusses how blockchain and ML address these issues. Furthermore, the study explores emerging trends, such as lightweight blockchain systems and edge computing, to overcome implementation challenges. A new architecture is proposed, integrating blockchain with ML algorithms to create resilient, secure, and efficient energy trading markets. The paper underscores the need for global standardization, improved cybersecurity measures, and further research into how blockchain and ML can revolutionize smart grids. This study integrates current knowledge with a forward-looking perspective, providing valuable insights for researchers, policymakers, and stakeholders in the energy sector to collaboratively build a future of efficient and int
The behavior of users on online life service platforms like Meituan and Yelp often occurs within specific finegrained spatiotemporal contexts(i.e., when and where). Recommender systems, designed to serve millions of u...
详细信息
The behavior of users on online life service platforms like Meituan and Yelp often occurs within specific finegrained spatiotemporal contexts(i.e., when and where). Recommender systems, designed to serve millions of users, typically operate in a fully server-based manner, requiring on-device users to upload their behavioral data, including fine-grained spatiotemporal contexts, to the server, which has sparked public concern regarding privacy. Consequently, user devices only upload coarse-grained spatiotemporal contexts for user privacy protection. However, previous research mostly focuses on modeling fine-grained spatiotemporal contexts using knowledge graph convolutional models, which are not applicable to coarse-grained spatiotemporal contexts in privacy-constrained recommender systems. In this paper, we investigate privacy-preserving recommendation by leveraging coarse-grained spatiotemporal contexts. We propose the coarse-grained spatiotemporal knowledge graph for privacy-preserving recommendation(CSKG), which explicitly models spatiotemporal co-occurrences using common-sense knowledge from coarse-grained contexts. Specifically, we begin by constructing a spatiotemporal knowledge graph tailored to coarse-grained spatiotemporal contexts. Then we employ a learnable metagraph network that integrates common-sense information to filter and extract co-occurrences. CSKG evaluates the impact of coarsegrained spatiotemporal contexts on user behavior through the use of a knowledge graph convolutional network. Finally, we introduce joint learning to effectively learn representations. By conducting experiments on two real large-scale datasets,we achieve an average improvement of about 11.0% on two ranking metrics. The results clearly demonstrate that CSKG outperforms state-of-the-art baselines.
暂无评论