Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network...
详细信息
Alzheimer's disease is a well-known illness characterized by memory loss and cognitive decline. Since current treatments work best in the early stages, early detection is vital for effective management. The Magnet...
详细信息
Rice fields all across the world are affected by spikelet sterility, often known as rice spikelet's disease. It is characterized by the improper development of spikelet’s, which lowers grain output and quality. F...
详细信息
This review examines the methods, determinants, and forecasting horizons used in electricity demand forecasting in Türkiye. The study investigates how Türkiye's electricity demand is influenced by econom...
详细信息
Bronchopulmonary Dysplasia (BPD) is a chronic lung disease mostly affecting the premature newborns who are in the need for oxygen therapy. Main reason for this disease is underdeveloped lungs which need the help of ve...
详细信息
Metaheuristic methods are optimization techniques generally based on natural or physical phenomena. Although these processes inspire, the underlying mechanisms of these phenomena still need to be fully understood. Tra...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Background: The most important aspect of medical image processing and analysis is image segmentation. Fundamentally, the outcomes of segmentation have an impact on all subsequent image testing methods, including objec...
详细信息
In the burgeoning landscape of e-commerce, the ability to accurately classify product texts is paramount for enhancing user experience and driving business success. Traditional approaches to text classification often ...
详细信息
The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT devices has given rise to smart cities, smart factories, smart farms...
详细信息
暂无评论