The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce th...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical ***,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of ***,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical ***,we envision open issues and challenges of the Metaverse in the technical *** work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
Recently,energy harvesting wireless sensor networks(EHWSN)have increased significant attention among research *** harvesting energy from the neighboring environment,the sensors in EHWSN resolve the energy constraint p...
详细信息
Recently,energy harvesting wireless sensor networks(EHWSN)have increased significant attention among research *** harvesting energy from the neighboring environment,the sensors in EHWSN resolve the energy constraint problem and offers lengthened network *** is one of the proficient ways for accomplishing even improved lifetime in *** clustering process intends to appropriately elect the cluster heads(CHs)and construct *** several models are available in the literature,it is still needed to accomplish energy efficiency and security in *** this view,this study develops a novel Chaotic Rider Optimization Based Clustering Protocol for Secure Energy Harvesting Wireless Sensor Networks(CROC-SEHWSN)*** presented CROC-SEHWSN model aims to accomplish energy efficiency by clustering the node in *** CROC-SEHWSN model is based on the integration of chaotic concepts with traditional rider optimization(RO)***,the CROC-SEHWSN model derives a fitness function(FF)involving seven distinct parameters connected to *** accomplish security,trust factor and link quality metrics are considered in the *** design of RO algorithm for secure clustering process shows the novelty of the *** order to demonstrate the enhanced performance of the CROC-SEHWSN approach,a wide range of simulations are carried out and the outcomes are inspected in distinct *** experimental outcome demonstrated the superior performance of the CROC-SEHWSN technique on the recent approaches with maximum network lifetime of 387.40 and 393.30 s under two scenarios.
Electrocardiogram(ECG)signal is a measure of the heart’s electrical ***,ECG detection and classification have benefited from the use of computer-aided systems by *** goal of this paper is to improve the accuracy of E...
详细信息
Electrocardiogram(ECG)signal is a measure of the heart’s electrical ***,ECG detection and classification have benefited from the use of computer-aided systems by *** goal of this paper is to improve the accuracy of ECG classification by combining the Dipper Throated Optimization(DTO)and Differential Evolution Algorithm(DEA)into a unified algorithm to optimize the hyperparameters of neural network(NN)for boosting the ECG classification *** addition,we proposed a new feature selection method for selecting the significant feature that can improve the overall *** prove the superiority of the proposed approach,several experimentswere conducted to compare the results achieved by the proposed approach and other competing ***,statistical analysis is performed to study the significance and stability of the proposed approach using Wilcoxon and ANOVA *** results confirmed the superiority and effectiveness of the proposed *** classification accuracy achieved by the proposed approach is(99.98%).
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a ...
详细信息
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a U-shaped keypoint detection network(DAUNet)based on an improved ResNet subsampling structure and spatial grouping *** network addresses key challenges in traditional methods,such as information loss,large network redundancy,and insufficient sensitivity to low-resolution *** is composed of three main ***,we introduce an improved BottleNeck block that employs partial convolution and strip pooling to reduce computational load and mitigate feature ***,after upsampling,the network eliminates redundant features,improving the overall ***,a lightweight spatial grouping attention mechanism is applied to enhance low-resolution semantic features within the feature map,allowing for better restoration of the original image size and higher *** results demonstrate that DAUNet achieves superior accuracy compared to most existing keypoint detection models,with a mean PCKh@0.5 score of 91.6%on the MPII dataset and an AP of 76.1%on the COCO ***,real-world experiments further validate the robustness and generalizability of DAUNet for detecting human bodies in unknown environments,highlighting its potential for broader applications.
Alzheimer's disease is the most common cause of dementia in older persons, with its incidence rising rapidly. This neurodegenerative disorder affects brain function, impacting memory and cognition, and presents si...
详细信息
One of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated *** malware attacks could lead to the execution of unauthorized acts on the victims’de...
详细信息
One of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated *** malware attacks could lead to the execution of unauthorized acts on the victims’devices,stealing personal information and causing hardware *** previous studies,machine learning(ML)has shown its efficacy in detecting malware events and classifying their ***,attackers are continuously developing more sophisticated methods to bypass ***,up-to-date datasets must be utilized to implement proactive models for detecting malware events in Android mobile ***,this study employed ML algorithms to classify Android applications into malware or goodware using permission and application programming interface(API)-based features from a recent *** overcome the dataset imbalance issue,RandomOverSampler,synthetic minority oversampling with tomek links(SMOTETomek),and RandomUnderSampler were applied to the Dataset in different *** results indicated that the extra tree(ET)classifier achieved the highest accuracy of 99.53%within an elapsed time of 0.0198 s in the experiment that utilized the RandomOverSampler ***,the explainable Artificial Intelligence(EAI)technique has been applied to add transparency to the high-performance ET *** global explanation using the Shapely values indicated that the top three features contributing to the goodware class are:Ljava/net/URL;->openConnection,Landroid/location/LocationManager;->getLastKgoodwarewnLocation,and *** the other hand,the top three features contributing to themalware class are Receive_Boot_Completed,Get_Tasks,and Kill_Background_*** is believed that the proposedmodel can contribute to proactively detectingmalware events in Android devices to reduce the number of victims and increase users’trust.
Unmanned Aerial Vehicles(UAvs)as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in ***,dynamic resource allocation and multi-connectivity can be adopt...
详细信息
Unmanned Aerial Vehicles(UAvs)as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in ***,dynamic resource allocation and multi-connectivity can be adopted to further harness the potentials of UAVs in improving communication capacity,in such situations such that the interference among users becomes a pivotal disincentive requiring effective *** this end,we investigate the Joint UAV-User Association,Channel Allocation,and transmission Power Control(J-UACAPC)problem in a multi-connectivity-enabled UAV network with constrained backhaul links,where each UAV can determine the reusable channels and transmission power to serve the selected ground *** goal was to mitigate co-channel interference while maximizing long-term system *** problem was modeled as a cooperative stochastic game with hybrid discrete-continuous action space.A Multi-Agent Hybrid Deep Reinforcement Learning(MAHDRL)algorithm was proposed to address this *** simulation results demonstrated the effectiveness of the proposed algorithm and showed that it has a higher system utility than the baseline methods.
Digital Twin is an implementation of a physical object or system into a digital space for efficient monitoring and better scalability. It is a virtual representation which acts as a digital counterpart for Cyber Physi...
详细信息
In this paper, we introduce block-wise separable convolutions (BlkSConv) to replace the standard convolutions for compressing deep CNN models. First, BlkSConv expresses the standard convolutional kernel as an ordered ...
详细信息
An authenticated manager must reinforce huge applications and operating systems, keeping information in the cloud while resisting potentially unreliable service providers. This article explores the presence of multipl...
详细信息
暂无评论