The growing dependence on deep learning models for medical diagnosis underscores the critical need for robust interpretability and transparency to instill trust and ensure responsible usage. This study investigates th...
详细信息
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
Anticipating the imminent surge of retired lithium-ion batteries(R-LIBs)from electric vehicles,the need for safe,cost-effective and environmentally friendly disposal technologies has *** paper seeks to offer a compreh...
详细信息
Anticipating the imminent surge of retired lithium-ion batteries(R-LIBs)from electric vehicles,the need for safe,cost-effective and environmentally friendly disposal technologies has *** paper seeks to offer a comprehensive overview of the entire disposal framework for R-LIBs,encompassing a broad spectrum of activities,including screening,repurposing and ***,we delve deeply into a thorough examination of current screening technologies,shifting the focus from a mere enumeration of screening methods to the exploration of the strategies for enhancing screening ***,we outline battery repurposing with associated key factors,summarizing stationary applications and sizing methods for R-LIBs in their second life.A particular light is shed on available reconditioning solutions,demonstrating their great potential in facilitating battery safety and lifetime in repurposing scenarios and identifying their techno-economic *** the realm of battery recycling,we present an extensive survey of pre-treatment options and subsequent material recovery ***,we introduce several global leading recyclers to illustrate their industrial processes and technical ***,relevant challenges and evolving trends are investigated in pursuit of a sustainable end-of-life management and disposal *** hope that this study can serve as a valuable resource for researchers,industry professionals and policymakers in this field,ultimately facilitating the adoption of proper disposal practices.
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the generated counterfeit facial images have become increasingly challenging to distinguish. There is an urgent need for a more robust and convincing detection method. Current detection methods mainly operate in the spatial domain and transform the spatial domain into other domains for analysis. With the emergence of transformers, some researchers have also combined traditional convolutional networks with transformers for detection. This paper explores the artifacts left by Deepfakes in various domains and, based on this exploration, proposes a detection method that utilizes the steganalysis rich model to extract high-frequency noise to complement spatial features. We have designed two main modules to fully leverage the interaction between these two aspects based on traditional convolutional neural networks. The first is the multi-scale mixed feature attention module, which introduces artifacts from high-frequency noise into spatial textures, thereby enhancing the model's learning of spatial texture features. The second is the multi-scale channel attention module, which reduces the impact of background noise by weighting the features. Our proposed method was experimentally evaluated on mainstream datasets, and a significant amount of experimental results demonstrate the effectiveness of our approach in detecting Deepfake forged faces, outperforming the majority of existing methods.
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital...
详细信息
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital-izations,and increased healthcare *** reminder systems often fail due to a lack of personalization and real-time *** address this critical challenge,we introduce MediServe,an advanced IoT-enabled medication management system that seamlessly integrates deep learning techniques to provide a personalized,secure,and adaptive *** features a smart medication box equipped with biometric authentication,such as fingerprint recognition,ensuring authorized access to prescribed medication while preventing misuse.A user-friendly mobile application complements the system,offering real-time notifications,adherence tracking,and emergency alerts for caregivers and healthcare *** system employs predictive deep learning models,achieving an impressive classification accuracy of 98%,to analyze user behavior,detect anomalies in medication adherence,and optimize scheduling based on an individual’s habits and health ***,MediServe enhances accessibility by employing natural language processing(NLP)models for voice-activated interactions and text-to-speech capabilities,making it especially beneficial for visually impaired users and those with cognitive ***-based data analytics and wireless connectivity facilitate remote monitoring,ensuring that caregivers receive instant alerts in case of missed doses or medication ***,machine learning-based clustering and anomaly detection refine medication reminders by adapting to users’changing health *** combining IoT,deep learning,and advanced security protocols,MediServe delivers a comprehensive,intelligent,and inclusive solution for medication *** innovative approach not only improves the quality of life for elderly
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not eff...
详细信息
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not effectively solve the problems such as the weak feature extraction ability of poetry text,which leads to the low performance of the model on sentiment analysis for Chinese classical *** this research,we offer the SA-Model,a poetic sentiment analysis ***-Model firstly extracts text vector information and fuses it through Bidirectional encoder representation from transformers-Whole word masking-extension(BERT-wwmext)and Enhanced representation through knowledge integration(ERNIE)to enrich text vector information;Secondly,it incorporates numerous encoders to remove text features at multiple levels,thereby increasing text feature information,improving text semantics accuracy,and enhancing the model’s learning and generalization capabilities;finally,multi-feature fusion poetry sentiment analysis model is *** feasibility and accuracy of the model are validated through the ancient poetry sentiment *** with other baseline models,the experimental findings indicate that SA-Model may increase the accuracy of text semantics and hence improve the capability of poetry sentiment analysis.
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 196...
详细信息
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 1960s and *** the following 50 years,the research and application of biometrics have achieved fruitful *** 2014-2015,with the successful applications of some emerging information technologies and tools,such as deep learning,cloud computing,big data,mobile communication,smartphones,location-based services,blockchain,new sensing technology,the Internet of Things and federated learning,biometric technology entered a new development ***,taking 2014-2015 as the time boundary,the development of biometric technology can be divided into two *** addition,according to our knowledge and understanding of biometrics,we fur-ther divide the development of biometric technology into three phases,i.e.,biometrics 1.0,2.0 and *** 1.0 is the primary de-velopment phase,or the traditional development *** 2.0 is an explosive development phase due to the breakthroughs caused by some emerging information *** present,we are in the development phase of biometrics *** 3.0 is the future development phase of *** the biometrics 3.0 phase,biometric technology will be fully mature and can meet the needs of various *** 1.0 is the initial phase of the development of biometric technology,while biometrics 2.0 is the advanced *** this paper,we provide a brief review of biometrics ***,the concept of biometrics 2.0 is defined,and the architecture of biometrics 2.0 is *** particular,the application architecture of biometrics 2.0 in smart cities is *** challenges and perspectives of biometrics 2.0 are also discussed.
Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural Networks (DNN) have proven to be very useful in terms of noise genera...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data *** this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in *** the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy ***,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF *** propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF *** framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy *** data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy *** propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query *** VB-cm tree uses the vector commitment to verify the query *** fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing *** conduct an extensive evaluation of the proposed *** experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
暂无评论