With the process of medical informatization,medical diagnosis results are recorded and shared in the form of electronic data in the ***,the security of medical data storage cannot be effectively protected and the unsa...
详细信息
With the process of medical informatization,medical diagnosis results are recorded and shared in the form of electronic data in the ***,the security of medical data storage cannot be effectively protected and the unsafe sharing of medical data among different institutions is still a hidden danger that cannot be *** solve the above problems,a secure storage and sharing model of private data based on blockchain technology and homomorphic encryption is *** on the idea of blockchain decentralization,the model maintains a reliable medical alliance chain system to ensure the safe transmission of data between different institutions;A privacy data encryption and computing protocol based on homomorphic encryption is constructed to ensure the safe transmission of medical data;Using its complete anonymity to ensure the Blockchain of medical data and patient identity privacy;A strict transaction control management mechanism of medical data based on Intelligent contract automatic execution of preset instructions is *** security verification,compared with the traditional medical big data storage and sharing mode,the model has better security and sharing.
Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p...
详细信息
Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** paper proposes a novel Spiral Mechanism-Optimized Phasmatodea Population Evolution Algorithm(SPPE)to improve clustering *** SPPE algorithm introduces several enhancements to the standard Phasmatodea Population Evolution(PPE)***,a Variable Neighborhood Search(VNS)factor is incorporated to strengthen the local search capability and foster population ***,a position update model,incorporating a spiral mechanism,is designed to improve the algorithm’s global exploration and convergence ***,a dynamic balancing factor,guided by fitness values,adjusts the search process to balance exploration and exploitation *** performance of SPPE is first validated on CEC2013 benchmark functions,where it demonstrates excellent convergence speed and superior optimization results compared to several state-of-the-art metaheuristic *** further verify its practical applicability,SPPE is combined with the K-means algorithm for data clustering and tested on seven *** results show that SPPE-K-means improves clustering accuracy,reduces dependency on initialization,and outperforms other clustering *** study highlights SPPE’s robustness and efficiency in solving both optimization and clustering challenges,making it a promising tool for complex data analysis tasks.
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a ...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a *** represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual ***,the model can recognize frequencies of regular behavior to profile the user manner in the *** subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular *** importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the *** detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including ***,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workfl*** contrast,the irregular patterns can trigger an alert for a potential *** framework has been fully described where the evaluation metrics have also been *** experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM *** paper has been concluded with pro-viding the potential directions for future improvements.
The enormous developments of gaming devices as well as mobile apps have increased the demand of bandwidth. Development of wireless applications has been affected because of the insufficient spectrum resources in the 3...
详细信息
Semantic segmentation has been widely used in various fields of remote sensing;however, ultra-high resolution remote sensing images, due to their extremely high resolution, exhibit more spatial details and cannot be d...
详细信息
Sufficient and high-quality data are a prerequisite for building complex machine learning systems, especially those with a large number of parameters (e.g., ChatGPT). However, it is typically challenging or even impos...
详细信息
Sufficient and high-quality data are a prerequisite for building complex machine learning systems, especially those with a large number of parameters (e.g., ChatGPT). However, it is typically challenging or even impossible to acquire a sufficient amount of real data to train such systems. For example, auto-driving systems may need to learn from various accidental events in order to be reliable in driving, while collecting such real data is difficult or ethically infeasible.
Recently people have difficulties distinguishing real speech from computer-generated speech so that the synthetic voice is getting closer to a natural-sounding voice, due to the advancements in deep learning and voice...
详细信息
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components...
详细信息
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components of image preprocessing,fostering an improvement in the quality of remote sensing *** enhancement renders remote sensing data more indispensable,thereby enhancing the accuracy of target *** defogging techniques based on simplistic atmospheric degradation models have proven inadequate for mitigating non-uniform haze within remotely sensed *** response to this challenge,a novel UNet Residual Attention Network(URA-Net)is *** paradigmatic approach materializes as an end-to-end convolutional neural network distinguished by its utilization of multi-scale dense feature fusion clusters and gated jump *** essence of our methodology lies in local feature fusion within dense residual clusters,enabling the extraction of pertinent features from both preceding and current local data,depending on contextual *** intelligently orchestrated gated structures facilitate the propagation of these features to the decoder,resulting in superior outcomes in haze *** validation through a plethora of experiments substantiates the efficacy of URA-Net,demonstrating its superior performance compared to existing methods when applied to established datasets for remote sensing image *** the RICE-1 dataset,URA-Net achieves a Peak Signal-to-Noise Ratio(PSNR)of 29.07 dB,surpassing the Dark Channel Prior(DCP)by 11.17 dB,the All-in-One Network for Dehazing(AOD)by 7.82 dB,the Optimal Transmission Map and Adaptive Atmospheric Light For Dehazing(OTM-AAL)by 5.37 dB,the Unsupervised Single Image Dehazing(USID)by 8.0 dB,and the Superpixel-based Remote Sensing Image Dehazing(SRD)by 8.5 *** noteworthy,on the SateHaze1k dataset,URA-Net attains preeminence in overall performance,yieldi
Customized text-to-video generation aims to generate text-guided videos with user-given subjects, which has gained increasing attention. However, existing works are primarily limited to single-subject oriented text-to...
详细信息
Agriculture plays a vital role in providing food to a growing world population. However, plant diseases and pests result in 50% reductions in crop yields, which exacerbates poverty and threatens a sustainable food sys...
详细信息
暂无评论