The software development projects’ testing part is usually expensive and complex, but it is essential to gauge the effectiveness of the developed software. Software Fault Prediction (SFP) primarily serves to detect f...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure *** of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB *** this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)*** proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three *** proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment *** achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 *** findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computin...
详细信息
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computing ability of mobile ***,devices’life and performance depend on ***,in many scenarios,such as industrial production and automotive systems,where the environmental temperatures are usually high,it is important to control devices’temperatures to maintain steady *** this paper,we propose a thermal-aware channel-wise heterogeneous NN inference *** contains two parts,the thermal-aware dynamic frequency(TADF)algorithm and the heterogeneous-processor single-layer workload distribution(HSWD)*** on a mobile device’s architecture characteristics and environmental temperature,TADF can adjust the appropriate running speed of the central processing unit and graphics processing unit,and then the workload of each layer in the NN model is distributed by HSWD in line with each processor’s running speed and the characteristics of the layers as well as heterogeneous *** experimental results,where representative NNs and mobile devices were used,show that the proposed method can considerably improve the speed of the on-device inference by 21%–43%over the traditional inference method.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
This paper addresses a cooperative relative navigation problem for multiple aerial agents,relying on visual tracking information between *** research aims to investigate a sensor fusion architecture and algorithm that...
详细信息
This paper addresses a cooperative relative navigation problem for multiple aerial agents,relying on visual tracking information between *** research aims to investigate a sensor fusion architecture and algorithm that leverages partially available absolute navigation knowledge while exploiting collaborative visual interaction between vehicles in mission flight areas,where satellite navigation-denied regions are irregularly *** achieve this,the paper introduces a new approach to defining the relative poses of cameras and develops a corresponding process to secure the relative pose *** contrasts with previous research,which simply linearized the relative pose information of aircraft cameras into navigation states defined in an absolute coordinate ***,the target pose in relative navigation is defined,and the pose of the camera and feature points are directly derived using dual quaternion representation,which compactly represents both translation and ***,a mathematical model for the relative pose of the camera is derived through the dual quaternion framework,enabling an explicit pose formulation of relative *** study investigates navigation performance in typical mission flight scenarios using an in-house high-fidelity simulator and quantitatively highlights the contributions of the proposed scheme by comparing the navigation error ***,the proposed method demonstrates to have navigation accuracy in decimeter level even in GNSS-denied environments and an improved 3D Root Mean Square(RMS)error by30%smaller than the conventional absolute navigation framework.
Background: Virtualization adequately maintains increasing requirements for storage, networking, servers, and computing in exhaustive cloud data centers (CDC)s. Virtualization assists in gaining different objectives l...
详细信息
Background: Virtualization adequately maintains increasing requirements for storage, networking, servers, and computing in exhaustive cloud data centers (CDC)s. Virtualization assists in gaining different objectives like dedicated server sustenance, fault tolerance, comprehensive service availability, and load balancing, by virtual machine (VM) migration. The VM migration process continuously requires CPU cycles, communication bandwidth, memory, and processing power. Therefore, it detrimentally prevails over the performance of dynamic applications and cannot be completely neglected in the synchronous large-scale CDC, explicitly when service level agreement (SLA) and analytical trade goals are to be defined. Introduction: Live VM migration is intermittently adopted as it grants the operational service even when the migration is executed. Currently, power competence has been identified as the primary design requirement for the current CDC model. It grows from a single server to numerous data centres and clouds, which consume an extensive amount of electricity. Consequently, appropriate energy management techniques are especially important for CDCs. Methods: This review paper delineates the need for energy efficiency in the CDC, the systematic mapping of VM migration methods, and research pertinent to it. After that, an analysis of VM migration techniques, the category of VM migration, duplication, and context-based VM migration is presented along with its relative analysis. Results: The various VM migration techniques were compared on the basis of various performance measures. The techniques based on duplication and context-based VM migration methods provide an average reduction in migration time of up to 38.47%, data transfer rate of up to 51.4%, migration downtime of up to 36.33%, network traffic rate of up to 44% and reduced application efficiency overhead up to 14.27%. Conclusion: The study aids in analyzing threats and research challenges related to VM migration
The perception of salty taste is crucial for individuals to make healthy food ***,the brain electrophysiological signals underlying salty taste perception have been poorly *** this study,electroencephalography(EEG)was...
详细信息
The perception of salty taste is crucial for individuals to make healthy food ***,the brain electrophysiological signals underlying salty taste perception have been poorly *** this study,electroencephalography(EEG)was used to record brain activity induced by Na Cl solution as a salty taste stimulus.A combination of a custom delivery device and stimulation paradigm was employed to preserve the salty taste signal clearly.A stimulus-response capture method was proposed that could adapt to individual differences in brain responses to salty taste and accurately segment salty taste response *** this method to the EEG processing workflow can form a complete data processing *** results showed that the neural response induced by salty taste reached a high activity level in the initial stage within a short period(0.2 s),and there was a sustained periodic response within 0.75 s after the ***,the salty taste information in the EEG signal was decoded,and discrimination of 2 similar concentrations of salty taste solutions was achieved far above the chance level(average identification rate:89.66%).This study demonstrated experimental paradigms and research methods for understanding salty taste perception,which could provide references for research on other basic tastes.
Process monitoring plays a pivotal role in elucidating the intricate interplay among process, structure, and property in additive manufacturing production. The control of powder spreading affects not only particle adh...
详细信息
Cardiovascular disease(CVD)remains a leading global health challenge due to its high mortality rate and the complexity of early diagnosis,driven by risk factors such as hypertension,high cholesterol,and irregular puls...
详细信息
Cardiovascular disease(CVD)remains a leading global health challenge due to its high mortality rate and the complexity of early diagnosis,driven by risk factors such as hypertension,high cholesterol,and irregular pulse *** diagnostic methods often struggle with the nuanced interplay of these risk factors,making early detection *** this research,we propose a novel artificial intelligence-enabled(AI-enabled)framework for CVD risk prediction that integrates machine learning(ML)with eXplainable AI(XAI)to provide both high-accuracy predictions and transparent,interpretable *** to existing studies that typically focus on either optimizing ML performance or using XAI separately for local or global explanations,our approach uniquely combines both local and global interpretability using Local Interpretable Model-Agnostic Explanations(LIME)and SHapley Additive exPlanations(SHAP).This dual integration enhances the interpretability of the model and facilitates clinicians to comprehensively understand not just what the model predicts but also why those predictions are made by identifying the contribution of different risk factors,which is crucial for transparent and informed decision-making in *** framework uses ML techniques such as K-nearest neighbors(KNN),gradient boosting,random forest,and decision tree,trained on a cardiovascular ***,the integration of LIME and SHAP provides patient-specific insights alongside global trends,ensuring that clinicians receive comprehensive and actionable *** experimental results achieve 98%accuracy with the Random Forest model,with precision,recall,and F1-scores of 97%,98%,and 98%,*** innovative combination of SHAP and LIME sets a new benchmark in CVD prediction by integrating advanced ML accuracy with robust interpretability,fills a critical gap in existing *** framework paves the way for more explainable and transparent decision-making in he
Background: Pneumonia is one of the leading causes of death and disability due to respiratory infections. The key to successful treatment of pneumonia is in its early diagnosis and correct classification. PneumoniaNet...
详细信息
暂无评论