The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled smart *** high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for ***,there is a high computation latency due to the presence of a remote cloud *** computing,which brings the computation close to the data source is introduced to overcome this *** an IoT-enabled smart city environment,one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay *** efficient resource allocation at the edge is helpful to address this *** this paper,an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation ***,we presented a three-layer network architecture for IoT-enabled smart ***,we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization *** Automata(LA)is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource *** extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
Delay/disruption tolerant networking(DTN) is proposed as a networking architecture to overcome challenging space communication characteristics for reliable data transmission service in presence of long propagation del...
详细信息
Delay/disruption tolerant networking(DTN) is proposed as a networking architecture to overcome challenging space communication characteristics for reliable data transmission service in presence of long propagation delays and/or lengthy link disruptions. Bundle protocol(BP) and Licklider Transmission Protocol(LTP) are the main key technologies for DTN. LTP red transmission offers a reliable transmission mechanism for space networks. One of the key metrics used to measure the performance of LTP in space applications is the end-to-end data delivery delay, which is influenced by factors such as the quality of spatial channels and the size of cross-layer packets. In this paper, an end-to-end reliable data delivery delay model of LTP red transmission is proposed using a roulette wheel algorithm, and the roulette wheel algorithm is more in line with the typical random characteristics in space networks. The proposed models are validated through real data transmission experiments on a semi-physical testing platform. Furthermore, the impact of cross-layer packet size on the performance of LTP reliable transmission is analyzed, with a focus on bundle size, block size, and segment size. The analysis and study results presented in this paper offer valuable contributions towards enhancing the reliability of LTP transmission in space communication scenarios.
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer(CRC)in clinical ***,due to scale variation and blurry polyp boundaries,it is still a challenging task to achieve satisfac...
详细信息
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer(CRC)in clinical ***,due to scale variation and blurry polyp boundaries,it is still a challenging task to achieve satisfactory segmentation performance with different scales and *** this study,we present a novel edge-aware feature aggregation network(EFA-Net)for polyp segmentation,which can fully make use of cross-level and multi-scale features to enhance the performance of polyp ***,we first present an edge-aware guidance module(EGM)to combine the low-level features with the high-level features to learn an edge-enhanced feature,which is incorporated into each decoder unit using a layer-by-layer ***,a scale-aware convolution module(SCM)is proposed to learn scale-aware features by using dilated convolutions with different ratios,in order to effectively deal with scale ***,a cross-level fusion module(CFM)is proposed to effectively integrate the cross-level features,which can exploit the local and global contextual ***,the outputs of CFMs are adaptively weighted by using the learned edge-aware feature,which are then used to produce multiple side-out segmentation *** results on five widely adopted colonoscopy datasets show that our EFA-Net outperforms state-of-the-art polyp segmentation methods in terms of generalization and *** implementation code and segmentation maps will be publicly at https://***/taozh2017/EFANet.
Event extraction is an important part of natural language information extraction,and it’s widely employed in other natural language processing tasks including question answering and machine reading ***,there is a lac...
详细信息
Event extraction is an important part of natural language information extraction,and it’s widely employed in other natural language processing tasks including question answering and machine reading ***,there is a lack of recent comprehensive survey papers on event *** the past few years,numerous high-quality and innovative event extraction methods have been proposed,making it necessary to consolidate these new developments with previous work in order to provide a clear overview for researchers and serve as a reference for future *** addition,event detection is a fundamental sub-task in event extraction,previous survey papers have often overlooked the related work on event ***,this paper aims to bridge these gaps by presenting a comprehensive survey of event extraction,including recent advancements and an analysis of previous research on event *** resources for event extraction are first introduced in this research,and then the numerous neural network models currently employed in event extraction tasks are divided into four types:word sequence-based methods,graph-based neural network methods,external knowledge-based approaches,and prompt-based *** compare and contrast them in depth,pointing out the flaws and difficulties with existing ***,we discuss the future of event extraction development.
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ...
详细信息
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering *** literature studies have proposed numerousmodels for the classification of security ***,adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning ***,most of the researchers focus only on the classification of requirements with security *** did not consider other nonfunctional requirements(NFR)directly or indirectly related to *** has been identified as a significant research gap in security requirements *** major objective of this study is to propose a security requirements classification model that categorizes security and other relevant security *** use PROMISE_exp and DOSSPRE,the two most commonly used datasets in the software engineering *** proposed methodology consists of two *** the first step,we analyze all the nonfunctional requirements and their relation with security *** found 10 NFRs that have a strong relationship with security *** the second step,we categorize those NFRs in the security requirements *** proposedmethodology is a hybridmodel based on the ConvolutionalNeural Network(CNN)and Extreme Gradient Boosting(XGBoost)***,we evaluate the model by updating the requirement type column with a binary classification column in the dataset to classify the requirements into security and non-security *** performance is evaluated using four metrics:recall,precision,accuracy,and F1 Score with 20 and 28 epochs number and batch size of 32 for PROMISE_exp and DOSSPRE datasets and achieved 87.3%and 85.3%accuracy,*** proposed study shows an enhancement in metrics
Insomnia,whether situational or chronic,affects over a third of the general population in today’s ***,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrec...
详细信息
Insomnia,whether situational or chronic,affects over a third of the general population in today’s ***,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrecognized and *** Polysomnographic(PSG)is considered as one of the assessment methods,it is poorly tolerated and *** this paper,with the recent development of Internet-of-Things devices and edge computing techniques,we propose a detrended fractal dimension(DFD)feature for the analysis of heart-rate signals,which can be easily acquired by many wearables,of good sleepers and *** feature was derived by calculating the fractal dimension(FD)of detrended *** the trend component removal,we improved the null space pursuit algorithm and proposed an adaptive trend extraction *** experimental results demonstrated the efficacy of the proposed DFD index through numerical statistics and significance testing for healthy and insomnia groups,which renders it a potential biomarker for insomnia assessment and management.
In the evolving landscape of robotics and visual navigation,event cameras have gained important traction,notably for their exceptional dynamic range,efficient power consumption,and low *** these advantages,conventiona...
详细信息
In the evolving landscape of robotics and visual navigation,event cameras have gained important traction,notably for their exceptional dynamic range,efficient power consumption,and low *** these advantages,conventional processing methods oversimplify the data into 2 dimensions,neglecting critical temporal *** overcome this limitation,we propose a novel method that treats events as 3D time-discrete *** inspiration from the intricate biological filtering systems inherent to the human visual apparatus,we have developed a 3D spatiotemporal filter based on unsupervised machine learning *** filter effectively reduces noise levels and performs data size reduction,with its parameters being dynamically adjusted based on population *** ensures adaptability and precision under various conditions,like changes in motion velocity and ambient *** our novel validation approach,we first identify the noise type and determine its power spectral density in the event *** then apply a one-dimensional discrete fast Fourier transform to assess the filtered event data within the frequency domain,ensuring that the targeted noise frequencies are adequately *** research also delved into the impact of indoor lighting on event stream ***,our method led to a 37%decrease in the data point cloud,improving data quality in diverse outdoor settings.
Searching for single-phase solid solutions(SPSSs)in high-entropy alloys(HEAs)is a prerequisite for the intentional design and manipulation of microstructures of alloys in vast composition ***,to date,reported SPSS HEA...
详细信息
Searching for single-phase solid solutions(SPSSs)in high-entropy alloys(HEAs)is a prerequisite for the intentional design and manipulation of microstructures of alloys in vast composition ***,to date,reported SPSS HEAs are still rare due to the lack of reliable guiding principles for the synthesis of new SPSS ***,we demonstrate an ensemble machine-learning method capable of discovering SPSS HEAs by directly predicting quinary phase diagrams based only on atomic composition.A total of 2198 experimental structure data are extracted from as-sputtered quinary HEAs in the literature and used to train a random forest classifier(termed AS-RF)utilizing bagging,achieving a prediction accuracy of 94.6%compared with experimental *** AS-RF model is then utilized to predict 224 quinary phase diagrams including∼32,000 SPSS HEAs in Cr-Co-Fe-Ni-Mn-Cu-Al composition *** extrapolation capability of the AS-RF model is then validated by performing first-principle calculations using density functional theory as a benchmark for the predicted phase transition of newly predicted ***,interpretation of the AS-RF model weighting of the input parameters also sheds light on the driving forces behind HEA formation in sputtered systems with the main contributors being:valance electron concentration,work function,atomic radius difference and elementary symmetries.
暂无评论