With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
The scheme of water resources management is a necessity for reducing water scarcity in arid areas and improving water availability in general [1]. However, water leak detection and irrigation scheduling traditional AI...
详细信息
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been em...
详细信息
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been employed in the Intelligent Transport System (ITS) to provide services for convenient and safe traveling, effective traffic management, and smart signal control. Most of these frameworks typically involve learning processes that utilize learning algorithms and requires training data. For highway traffic, the Greenshields model offers a practical relationship among vehicle speeds, traffic flows, and traffic density, which can serve as fundamental knowledge for developing intelligent traffic management systems. This paper proposes a fuzzy logic system based on the Greenshields model as the knowledge base for quickly predicting highway traffic congestion without extensive preparing data. Our system operates in two modes: jam and non-jam modes. In each model, the two inputs of vehicle speed and traffic flow are processed respectively with specified membership functions for effective fuzzification. The set of rules and conditions guided by the Greenshields theory is governed by the inference mechanism, which makes decisions according to the input field. Subsequently, the defuzzification process converts the fuzzy sets obtained by the inference engine into a congestion level as the output. To validate the accuracy of our system, a polynomial regression model utilizing realistic data from roadside equipment on the Sun Yat-Sen Highway in Taiwan is established for comparison. Comparing the observed data points from the polynomial regression model with the outputs obtained from our system using the same inputs, both predicting outputs are found to be consistent, affirming the practical feasibility of the proposed system. Moreover, our proposed scheme is adaptable to suit diverse road conditions without extensive training data and possesses a short memory to perform
It plays a central role in intelligent agent systems to model agents’epistemic states and their *** plays a key role in distributed systems,in which the messages transmitted may not be received instantly by the *** c...
详细信息
It plays a central role in intelligent agent systems to model agents’epistemic states and their *** plays a key role in distributed systems,in which the messages transmitted may not be received instantly by the *** characterize asynchronous communications,Asynchronous Announcement Logic(AAL)has been presented,which focuses on the logic laws of the change of epistemic state after receiving *** AAL does not involve the interactive behaviours between an agent and its *** interactions can change agents’epistemic states,while the latter will affect the *** enriching the well-known-calculus by adding the operators for passing basic facts and applying the well-known action model logic to describe agents’epistemic states,this paper presents the ecalculus to model epistemic interactions between agents with epistemic *** e-calculus can be adopted to characterize synchronous and asynchronous communications between *** capture the asynchrony,a buffer pool is constructed to store the basic facts announced and each agent reads these facts from this buffer pool in some *** on the transmission of link names,the e-calculus is able to realize reading from this buffer pool in different *** paper gives two examples:one is to read in the order in which the announced basic facts are sent(First-in-first-out,FIFO),and the other is in an arbitrary order.
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
In an era of rapid digital transformation, orga-nizations often grapple with inadequate and reactive strategic planning, leading to potential market capitalization losses and missed opportunities. Traditional methods ...
详细信息
Evolutionary algorithms have been extensively utilized in practical ***,manually designed population updating formulas are inherently prone to the subjective influence of the *** programming(GP),characterized by its t...
详细信息
Evolutionary algorithms have been extensively utilized in practical ***,manually designed population updating formulas are inherently prone to the subjective influence of the *** programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world *** paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human *** modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the *** designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update *** Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the *** validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark ***,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking *** experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency.
Users may now create and use large amounts of data saved online thanks to e-commerce systems. Modern shoppers examine online reviews before making purchases. Evaluations are essential for both people and organizations...
详细信息
Denoising diffusion models have demonstrated tremendous success in modeling data distributions and synthesizing high-quality *** the 2D image domain,they have become the state-of-the-art and are capable of generating ...
详细信息
Denoising diffusion models have demonstrated tremendous success in modeling data distributions and synthesizing high-quality *** the 2D image domain,they have become the state-of-the-art and are capable of generating photo-realistic images with high *** recently,researchers have begun to explore how to utilize diffusion models to generate 3D data,as doing so has more potential in real-world *** requires careful design choices in two key ways:identifying a suitable 3D representation and determining how to apply the diffusion *** this survey,we provide the first comprehensive review of diffusion models for manipulating 3D content,including 3D generation,reconstruction,and 3D-aware image *** classify existing methods into three major categories:2D space diffusion with pretrained models,2D space diffusion without pretrained models,and 3D space *** also summarize popular datasets used for 3D generation with diffusion *** with this survey,we maintain a repository https://***/cwchenwang/awesome-3d-diffusion to track the latest relevant papers and ***,we pose current challenges for diffusion models for 3D generation,and suggest future research directions.
Disasters have serious effects on people's lives and buildings. Therefore, social media platforms, such as Twitter, have become more critical. They are crucial tools for responding to and managing disasters effect...
详细信息
暂无评论