The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ...
详细信息
In modern technology environments, raising users’ privacy awareness is crucial. Existing eforts largely focused on privacy policy presentation and failed to systematically address a radical challenge of user motivati...
详细信息
With the increasing complexity of application scenarios, the fusion of different remote sensing data types has gradually become a trend, which can greatly improve the utilization of massive remote sensing *** the prob...
With the increasing complexity of application scenarios, the fusion of different remote sensing data types has gradually become a trend, which can greatly improve the utilization of massive remote sensing *** the problem of change detection for heterogeneous remote images can be much more complicated than the traditional change detection for homologous remote sensing images,
The methodologies based on neural networks are substantial to accomplish sentiment analysis in the Social Internet of Things (SIoT). With social media sentiment analysis, significant insights can produce efficient and...
详细信息
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis...
详细信息
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development *** frameworks have been developed focusing on guiding software systemmanagers concerning offshore software ***,none of these studies delivered comprehensive guidelines for managing the whole process of *** is a considerable lack of research working on managing OSMO from a vendor’s ***,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s *** study validated the preliminary OSMO process model via a case study research *** results showed that the OSMO process model is applicable in an industrial setting with few *** industrial data collected during the case study enabled this paper to extend the preliminary OSMO process *** refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk.
The TrickBot Botnet, emerging in late 2016, has been a significant cybersecurity threat, leveraging sophisticated attack vectors such as phishing emails, network vulnerabilities, and secondary payloads. This paper pro...
详细信息
Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)***,delays in data retrieval can markedly hinder the efficacy of b...
详细信息
Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)***,delays in data retrieval can markedly hinder the efficacy of big data awareness detection *** advocate for a collaborative caching approach involving edge devices and cloud networks to combat *** strategy is devised to streamline the data retrieval path,subsequently diminishing network *** an adept cache processing scheme poses its own set of challenges,especially given the transient nature of monitoring data and the imperative for swift data transmission,intertwined with resource allocation *** paper unveils a novel mobile healthcare solution that harnesses the power of our collaborative caching approach,facilitating nuanced health monitoring via edge *** system capitalizes on cloud computing for intricate health data analytics,especially in pinpointing health *** the dynamic locational shifts and possible connection disruptions,we have architected a hierarchical detection system,particularly during *** system caches data efficiently and incorporates a detection utility to assess data freshness and potential lag in response ***,we introduce the Cache-Assisted Real-Time Detection(CARD)model,crafted to optimize *** the inherent complexity of the NP-hard CARD model,we have championed a greedy algorithm as a *** reveal that our collaborative caching technique markedly elevates the Cache Hit Ratio(CHR)and data freshness,outshining its contemporaneous benchmark *** empirical results underscore the strength and efficiency of our innovative IoHT-based health monitoring *** encapsulate,this paper tackles the nuances of real-time health data monitoring in the IoHT landscape,presenting a joint edge-cloud caching strategy paired with a hierarchical detection *** methodology yields enh
Existing works have shown that fine-tuned textual transformer models achieve state-of-the-art prediction performances but are also vulnerable to adversarial text perturbations. Traditional adversarial evaluation is of...
详细信息
Large language models (LLMs) have rapidly advanced and demonstrated impressive capabilities. In-Context Learning (ICL) and Parameter-Efficient Fine-Tuning (PEFT) are currently two mainstream methods for augmenting LLM...
In the era of data-driven decision-making, the ability to rapidly and accurately analyze vast amounts of textual data is essential. This paper examines the role of text pre-processing techniques in enhancing the effec...
详细信息
暂无评论