Artificial Intelligence (AI) is transforming numerous domains, including bioinformatics and information extraction systems, by advancing data processing capabilities, enhancing precision, and facilitating automation. ...
详细信息
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret...
详细信息
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoreticalmodels aim to study and analyze the strategic behaviors of individuals within a crowd and their interactionsduring the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. Thesemodels consider a group of individuals as homogeneous objects with the same goals, involve complex mathematicalformulation, and cannot model real-world scenarios such as panic, environmental information, crowds that movedynamically, etc. The proposed work presents a game theoretic model integrating an agent-based model to removethe obstacles from exits. The proposed model considered the parameters named: (1) obstacle size, length, andwidth, (2) removal time, (3) evacuation time, (4) crowd density, (5) obstacle identification, and (6) route *** proposed work conducts various experiments considering different conditions, such as obstacle types, obstacleremoval, and several obstacles. Evaluation results show the proposed model’s effectiveness compared with existingliterature in reducing the overall evacuation time, cell selection, and obstacle removal. The study is potentially usefulfor public safety situations such as emergency evacuations during disasters and calamities.
People may now receive and share information more quickly and easily than ever due to the widespread use of mobile networked devices. However, this can occasionally lead to the spread of false information. Such inform...
详细信息
Hepatic tumor thermal ablation surgery is currently one of the most effective methods for the clinical treatment of liver cancer. There are many studies on auxiliary systems for thermal ablation of liver tumors, but f...
详细信息
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive inform...
详细信息
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive information about private attributes of users(e.g.,race). Although many privacy-preserving mechanisms on co-inference have been proposed to eliminate privacy concerns, privacy leakage of sensitive attributes might still happen during inference. In this paper, we explore privacy leakage against the privacy-preserving co-inference by decoding the uploaded representations into a vulnerable form. We propose a novel attack framework named AttrL eaks, which consists of the shadow model of feature extractor(FE), the susceptibility reconstruction decoder,and the private attribute classifier. Based on our observation that values in inner layers of FE(internal representation) are more sensitive to attack, the shadow model is proposed to simulate the FE of the victim in the blackbox scenario and generates the internal ***, the susceptibility reconstruction decoder is designed to transform the uploaded representations of the victim into the vulnerable form, which enables the malicious classifier to easily predict the private attributes. Extensive experimental results demonstrate that AttrLeaks outperforms the state of the art in terms of attack success rate.
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi...
详细信息
In description logic,axiom pinpointing is used to explore defects in ontologies and identify hidden justifications for a logical *** recent years,SAT-based axiom pinpointing techniques,which rely on the enumeration of...
详细信息
In description logic,axiom pinpointing is used to explore defects in ontologies and identify hidden justifications for a logical *** recent years,SAT-based axiom pinpointing techniques,which rely on the enumeration of minimal unsatisfiable subsets(MUSes)of pinpointing formulas,have gained increasing *** with traditional Tableau-based reasoning approaches,SAT-based techniques are more competitive when computing justifications for consequences in large-scale lightweight description logic *** this article,we propose a novel enumeration justification algorithm,working with a replicated *** replicated driver discovers new justifications from the explored justifications through cheap literals resolution,which avoids frequent calls of SAT ***,when the use of SAT solver is inevitable,we adjust the strategies and heuristic parameters of the built-in SAT solver of axiom pinpointing *** adjusted SAT solver is able to improve the checking efficiency of unexplored *** proposed method is implemented as a tool named *** experimental results show that RDMinA outperforms the existing axiom pinpointing tools on practical biomedical ontologies such as Gene,Galen,NCI and Snomed-CT.
The Internet of Things (IoT) has developed into a crucial component for meeting the connection needs of the current smart healthcare systems. The Internet of Medical Things (IoMT) consists of medical devices that are ...
详细信息
Genomic sequencing has become increasingly prevalent, generating massive amounts of data and facing a significant challenge in long-term storage and transmission. A solution that reduces the storage and transfer requi...
详细信息
In today's changing world businesses are increasingly relying on private cloud solutions to meet their specific needs, for growth and effectiveness. This research paper explores the realm of cloud computing with a...
详细信息
暂无评论