In federated learning, clients cooperatively train a global model by training local models over their datasets under the coordination of a central server. However, clients may sometimes be unavailable for training due...
详细信息
Transformers have demonstrated outstanding performance in learned image compression (LIC) due to their high capacity for modeling complex dependencies. However, existing methods employ window-based attention mechanism...
详细信息
The likelihood of an agent's success in achieving its goals and subgoals under specific operational constraints is an important factor in performance-based trust. Trust management systems are being proposed to mon...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and peo...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and people,medical institutions,andmedical ***,with the openness of network transmission,the security and privacy of information transmission have become a major ***,Masud et *** a lightweight anonymous user authentication protocol for IoT medical treatment,claiming that their method can resist various ***,through analysis of the protocol,we observed that their protocol cannot effectively resist privileged internal attacks,sensor node capture attacks,and stolen authentication attacks,and their protocol does not have perfect forward ***,we propose a new protocol to resolve the security vulnerabilities in Masud’s protocol and remove some redundant parameters,so as tomake the protocolmore compact and *** addition,we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.
Quantum computers leverage the principles of quantum mechanics to solve complex problems beyond the capabilities of classical computers, such as prime factorization, which poses a significant threat to cryptographic a...
详细信息
Learning disabilities present formidable obstacles for children in their educational journeys, often overlooked or misunderstood. This research aims to address two critical issues: the differentiation between learning...
详细信息
The rapid expansion of the Industrial Internet of Things (IIoT) has significantly advanced digital technologies and interconnected industrial sys- tems, creating substantial opportunities for growth. However, this gro...
详细信息
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of hete...
详细信息
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of heterogeneous big data as a consequence of the growth of power grid technologies,along with data processing and advanced *** main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information *** original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI ***,an AdaBelief Exponential Feature Selection(AEFS)technique is used to efficiently handle the input huge datasets from the smart grid for boosting ***,a Kernel based Extreme Neural Network(KENN)technique is used to anticipate security vulnerabilities more *** Polar Bear Optimization(PBO)algorithm is used to efficiently determine the parameters for the estimate of radial basis ***,several types of smart grid network datasets are employed during analysis in order to examine the outcomes and efficiency of the proposed AdaBelief Exponential Feature Selection-Kernel based Extreme Neural Network(AEFS-KENN)big data security *** results reveal that the accuracy of proposed AEFS-KENN is increased up to 99.5%with precision and AUC of 99%for all smart grid big datasets used in this study.
The goal of a generic evolutionary multi- or many-objective algorithm is to explore a search space and find the trade-off optimal solutions for two or more conflicting objectives. In platform-based practical design op...
详细信息
The demand for video streaming services over Internet of Things (IoT) networks has surged, yet maintaining a high Quality of Experience (QoE) remains challenging due to network heterogeneity and resource constraints. ...
详细信息
暂无评论