By caching and transcoding video files on edge servers, video edge caching (VEC) can alleviate network congestion and improve user experience. To achieve this, VEC needs to address resource allocation and pricing prob...
详细信息
In the optimization of intelligent network architecture, limited resources at each node, including edge computing devices, have posed challenges for deploying large models in performance-demanding scenarios. Knowledge...
详细信息
In this work,we consider an Unmanned Aerial Vehicle(UAV)-aided covert transmission network,which adopts the uplink transmission of communication Nodes(CNs)as a cover to facilitate covert transmission to a Primary Comm...
详细信息
In this work,we consider an Unmanned Aerial Vehicle(UAV)-aided covert transmission network,which adopts the uplink transmission of communication Nodes(CNs)as a cover to facilitate covert transmission to a Primary communication Node(PCN).Specifically,all nodes transmit to the UAV exploiting uplink non-Orthogonal Multiple Access(NOMA),while the UAV performs covert transmission to the PCN at the same *** minimize the average age of covert information,we formulate a joint optimization problem of UAV trajectory and power allocation designing subject to multi-dimensional constraints including covertness demand,communication quality requirement,maximum flying speed,and the maximum available *** address this problem,we embed Signomial Programming(SP)into Deep Reinforcement Learning(DRL)and propose a DRL framework capable of handling the constrained Markov decision processes,named SP embedded Soft Actor-Critic(SSAC).By adopting SSAC,we achieve the joint optimization of UAV trajectory and power *** simulations show the optimized UAV trajectory and verify the superiority of SSAC compared with various existing baseline *** results of this study suggest that by maintaining appropriate distances from both the PCN and CNs,one can effectively enhance the performance of covert communication by reducing the detection probability of the CNs.
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident preventi...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic *** these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle *** paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly ***-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by *** systems can autonomously create specific models based on network data to differentiate between regular traffic and *** these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational *** evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and *** review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV *** examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
Despite the rapid growth of the ICT sector, there is a gap between it and STEM education, resulting in high dropout rates in computer science and engineering programs. This has led to many vacancies in the ICT job mar...
详细信息
Big Data applications face different types of complexities in *** and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discr...
详细信息
Big Data applications face different types of complexities in *** and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discriminative features in processed *** existing scheme has many disadvantages including continuity in training,more samples and training time in feature selections and increased classification execution *** ensemble methods have made a mark in classification tasks as combine multiple results into a single *** comparing to a single model,this technique offers for improved *** based feature selections parallel multiple expert’s judgments on a single *** major goal of this research is to suggest HEFSM(Heterogeneous Ensemble Feature Selection Model),a hybrid approach that combines multiple *** major goal of this research is to suggest HEFSM(Heterogeneous Ensemble Feature Selection Model),a hybrid approach that combines multiple ***,individual outputs produced by methods producing subsets of features or rankings or voting are also combined in this ***(K-Nearest Neighbor)classifier is used to classify the big dataset obtained from the ensemble learning *** results found of the study have been good,proving the proposed model’s efficiency in classifications in terms of the performance metrics like precision,recall,F-measure and accuracy used.
Malaria is a dangerous and potentially fatal disease caused by Plasmodium parasites that are transferred to humans through the bites of infected Anopheles mosquitos. The most common and accepted technique of diagnosin...
详细信息
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseas...
详细信息
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseases can have severe consequences and spread,especially among *** detection is crucial to prevent their spread and improve a patient’s chances of ***,the branch of medicine dealing with skin diseases,faces challenges in accurately diagnosing these conditions due to the difficulty in identifying and distinguishing between different diseases based on their appearance,type of skin,and *** study presents a method for detecting skin diseases using Deep Learning(DL),focusing on the most common diseases affecting children in Saudi Arabia due to the high UV value in most of the year,especially in the *** method utilizes various Convolutional Neural Network(CNN)architectures to classify skin conditions such as eczema,psoriasis,and *** proposed method demonstrates high accuracy rates of 99.99%and 97%using famous and effective transfer learning models MobileNet and DenseNet121,*** illustrates the potential of DL in automating the detection of skin diseases and offers a promising approach for early diagnosis and treatment.
We plan to develop a specialized training system to enhance the competitive skills of players in the first-person shooter game "Valorant", aiming to improve their abilities and tactical understanding within ...
详细信息
暂无评论