The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and f...
详细信息
The exponential growth of wireless sensor networks (WSNs) in various applications underscores the critical need for energy-efficient routing protocols to extend network lifespan. This paper introduces the Energy-Effic...
详细信息
作者:
Rajkumar, K.Ragupathi, T.Karthikeyan, S.School of Computing
Srm Institute of Science and Technology Department of Data Science and Business Systems Tamil Nadu Kattankulathur India
Department of Computer Science and Engineering Bangalore562112 India
The main objective of this project is to create a user-friendly intelligent chatbot for Medical guidance and support. This application has been classified into two different modes based on user preference, those are O...
详细信息
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in...
详细信息
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in the fog computing environment is a pivotal *** different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing ***,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog *** Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,*** boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat *** sequence generated by this map is used to transform the coordinates of the fog *** improved range of the proposed map is depicted using bifurcation *** quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate *** also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical *** experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature.
We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions...
详细信息
Dementia is an un-repairable and continuous disease that affects a person's mental health. Symptoms of Dementia may vary from one person to another, there are no effective treatments for detecting Dementia. Machin...
详细信息
This study introduces a monitoring system that can accurately predict the quality of friction stir *** study involved four different sets of welding experiments using varying materials and tool *** goal was to create ...
详细信息
This study introduces a monitoring system that can accurately predict the quality of friction stir *** study involved four different sets of welding experiments using varying materials and tool *** goal was to create a universal monitoring system capable of predicting weld quality across these diverse experimental ***-time welding data was collected using instruments such as load cells and a power *** processing methods were then used to analyze this data and extract essential information about welding ***,federated learning(FL)was used to develop the universal monitoring *** method involves collective learning and model training,leading to a global model trained on decentralized data from the different experimental *** approach proved to be effective in forecasting weld quality,achieving a mean absolute error(MAE)of 10.44 for all welding ***,it offered benefits such as reduced latency and enhanced user data protection,while maintaining the accuracy of the global *** artificial neural network model was also developed for comparison with FL,achieving a MAE of 13.85 for the welding ***,this study demonstrates the effectiveness of training global and more reliable models,with multiple devices sharing their knowledge bases to train the global model effectively.
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-gen...
详细信息
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-generation(6G) era. This gives rise to an emerging research area known as edge intelligence, which concerns the distillation of human-like intelligence from the vast amount of data scattered at the wireless network edge. Typically, realizing edge intelligence corresponds to the processes of sensing, communication,and computation, which are coupled ingredients for data generation, exchanging, and processing, ***, conventional wireless networks design the three mentioned ingredients separately in a task-agnostic manner, which leads to difficulties in accommodating the stringent demands of ultra-low latency, ultra-high reliability, and high capacity in emerging AI applications like auto-driving and metaverse. This thus prompts a new design paradigm of seamlessly integrated sensing, communication, and computation(ISCC) in a taskoriented manner, which comprehensively accounts for the use of the data in downstream AI tasks. In view of its growing interest, this study provides a timely overview of ISCC for edge intelligence by introducing its basic concept, design challenges, and enabling techniques, surveying the state-of-the-art advancements, and shedding light on the road ahead.
Since the beginning of the internet era, there has been an explosion of growth in structured data (such as numbers, symbols, and labels) as well as unstructured data (including images, videos, and text). Efficient and...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the safe operation of power ***,a YOLOv5 target detection method based on a deep convolution neural network is *** this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the *** structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection *** the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the *** pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data *** experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,*** the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods.
暂无评论