There are many ways to track the traffic conditions on roads. With the rise of AI-based image processing technology, there has been a surge in interest in developing traffic monitoring systems that rely on camera visi...
详细信息
Depressive Disorders (DD) is one of the most prevalent mental disorders in the world that may lead to suicide cases. To prevent the latter, ubiquitous early detection systems may be effective. Recent studies have sinc...
详细信息
Sliding mode control(SMC)has been studied since the 1950s and widely used in practical applications due to its insensitivity to matched *** aim of this paper is to present a review of SMC describing the key developmen...
详细信息
Sliding mode control(SMC)has been studied since the 1950s and widely used in practical applications due to its insensitivity to matched *** aim of this paper is to present a review of SMC describing the key developments and examining the new trends and challenges for its application to power electronic *** fundamental theory of SMC is briefly reviewed and the key technical problems associated with the implementation of SMC to power converters and drives,such chattering phenomenon and variable switching frequency,are discussed and *** recent developments in SMC systems,future challenges and perspectives of SMC for power converters are discussed.
This study explores the effectiveness, ethical considerations, and demographic influences of AI-based interventions in managing stress and anxiety. AI technologies, including Machine Learning, Natural Language Process...
详细信息
Data is the lifeblood of the modern world, forming a fundamental part of AI, decision-making, and research advances. With increase in interest in data, governments have taken important steps towards a regulated data w...
详细信息
Data is the lifeblood of the modern world, forming a fundamental part of AI, decision-making, and research advances. With increase in interest in data, governments have taken important steps towards a regulated data world, drastically impacting data sharing and data usability and resulting in massive amounts of data confined within the walls of organizations. While synthetic data generation (SDG) is an appealing solution to break down these walls and enable data sharing, the main drawback of existing solutions is the assumption of a trusted aggregator for generative model training. Given that many data holders may not want to, or be legally allowed to, entrust a central entity with their raw data, we propose a framework for collaborative and private generation of synthetic tabular data from distributed data holders. Our solution is general, applicable to any marginal-based SDG, and provides input privacy by replacing the trusted aggregator with secure multi-party computation (MPC) protocols and output privacy via differential privacy (DP). We demonstrate the applicability and scalability of our approach for the state-of-the-art select-measure-generate SDG algorithms MWEM+PGM and AIM. Copyright 2024 by the author(s)
In early December 2019,the city of Wuhan,China,reported an outbreak of coronavirus disease(COVID-19),caused by a novel severe acute respiratory syndrome coronavirus-2(SARS-CoV-2).On January 30,2020,the World Health Or...
详细信息
In early December 2019,the city of Wuhan,China,reported an outbreak of coronavirus disease(COVID-19),caused by a novel severe acute respiratory syndrome coronavirus-2(SARS-CoV-2).On January 30,2020,the World Health Organization(WHO)declared the outbreak a global pandemic *** the face of the COVID-19 pandemic,the most important step has been the effective diagnosis and monitoring of infected *** COVID-19 using Machine Learning(ML)technologies can help the health care unit through assistive diagnostic suggestions,which can reduce the health unit's burden to a certain *** paper investigates the possibilities of ML techniques in identifying/detecting COVID-19 patients including both conventional and exploring from chest X-ray images the effect of viral *** approach includes preprocessing,feature extraction,and ***,the features are extracted using the Histogram of Oriented(HOG)and Local Binary Pattern(LBP)feature ***,for the extracted features classification,six ML models of Support Vector Machine(SVM)and K-Nearest Neighbor(KNN)is *** results show that the diagnostic accuracy of random forest classifier(RFC)on extracted HOG plusLBP features is as high as 94%followed by SVM at 93%.The sensitivity of the K-nearest neighbour model has reached an accuracy of 88%.Overall,the predicted approach has shown higher classification accuracy and effective diagnostic *** is a highly useful tool for clinical practitioners and radiologists to help them in diagnosing and tracking the cases of COVID-19.
One of the major challenges in the world is to control the impacts of global warming and greenhouse gas emissions on the environment. To reduce CO2 emission, an environment friendly substitute for traditional fossil f...
详细信息
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The...
详细信息
We focus on the self-supervised discovery of manipulation concepts that can be adapted and reassembled to address various robotic tasks. We propose that the decision to conceptualize a physical procedure should not de...
详细信息
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep *** Deep Learning(FDL)is a novel distributed machine learning tec...
详细信息
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep *** Deep Learning(FDL)is a novel distributed machine learning technology and is able to address the challenges like data security,privacy risks,and huge communication overheads from big raw data ***,FDL can only guarantee data security and privacy among multiple clients during data *** the data sets stored locally in clients are corrupted,including being tampered with and lost,the training results of the FDL in intelligent IoVs must be negatively *** this paper,we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered ***,the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance,including efficient corrupted data locating and *** addition,a novel data structure,Skip Hash Table(SHT)is designed to optimize data ***,we illustrate the security of the scheme with the Computational Diffie-Hellman(CDH)assumption on bilinear *** theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs.
暂无评论