Scalability and information personal privacy are vital for training and deploying large-scale deep learning *** learning trains models on exclusive information by aggregating weights from various devices and taking ad...
详细信息
Scalability and information personal privacy are vital for training and deploying large-scale deep learning *** learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web ***,relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client ***,information relating to the training dataset can possibly be extracted from the distributed weights,potentially reducing the privacy of the local data used for *** this research paper,we aim to investigate the challenges of scalability and data privacy to increase the efficiency of distributed training *** a result,we propose a web-federated learning exchange(WebFLex)framework,which intends to improve the decentralization of the federated learning *** is additionally developed to secure distributed and scalable federated learning systems that operate in web browsers across heterogeneous ***,WebFLex utilizes peer-to-peer interactions and secure weight exchanges utilizing browser-to-browser web real-time communication(WebRTC),efficiently preventing the need for a main central *** has actually been measured in various setups using the MNIST *** results show WebFLex’s ability to improve the scalability of federated learning systems,allowing a smooth increase in the number of participating devices without central data *** addition,WebFLex can maintain a durable federated learning procedure even when faced with device disconnections and network ***,it improves data privacy by utilizing artificial noise,which accomplishes an appropriate balance between accuracy and privacy preservation.
In recent years,developed Intrusion Detection Systems(IDSs)perform a vital function in improving security and anomaly *** effectiveness of deep learning-based methods has been proven in extracting better features and ...
详细信息
In recent years,developed Intrusion Detection Systems(IDSs)perform a vital function in improving security and anomaly *** effectiveness of deep learning-based methods has been proven in extracting better features and more accurate classification than other *** this paper,a feature extraction with convolutional neural network on Internet of Things(IoT)called FECNNIoT is designed and implemented to better detect anomalies on the ***,a binary multi-objective enhance of the Gorilla troops optimizer called BMEGTO is developed for effective feature ***,the combination of FECNNIoT and BMEGTO and KNN algorithm-based classification technique has led to the presentation of a hybrid method called *** the next step,the proposed model is implemented on two benchmark data sets,NSL-KDD and TON-IoT and tested regarding the accuracy,precision,recall,and Fl-score *** proposed CNN-BMEGTO-KNN model has reached 99.99%and 99.86%accuracy on TON-IoT and NSL-KDD datasets,*** addition,the proposed BMEGTO method can identify about 27%and 25%of the effective features of the NSL-KDD and TON-IoT datasets,respectively.
Ecological validity remains essential for generalizing scientific research into real-world applications. However, current methods for crowd emotion detection lack ecological validity due to limited diversity samples i...
详细信息
Realizing digital-twin services is one of promising applications in 6 G mobile communication and network scenarios. In addition, the use of unmanned aerial vehicles (UAVs) is essential for enabling the services e...
详细信息
Realizing digital-twin services is one of promising applications in 6 G mobile communication and network scenarios. In addition, the use of unmanned aerial vehicles (UAVs) is essential for enabling the services even in the extreme areas where humans cannot reach. In this emerging scenario, it is necessary to design collaborative algorithms for autonomous UAV trajectory control and a centralized computing platform (e.g., cloud) in digital-twin networks. For this system, it is required to build energy-efficient algorithms due to the power-hungry nature in UAVs. Based on this requirements and system characteristics, this paper proposes autonomous UAV charging algorithms and systems where the UAVs are classified into two types, i.e., cluster UAVs (for main image recording operations in digital-twin services, and some of them take the roles of mobile edge computing) and charging UAVs (for charging the cluster UAVs). Our proposed charging should be (i) fully distributed for practical, scalable, and low-overhead operations and (ii) trustworthy for secure and privacy-preserving computation;where these are essential for collaborative operations. Therefore, a novel auction-based charging algorithm for UAV-based digital-twin networks is proposed in order to realize the distributed and truthful operations, which cannot be achieved by the convex optimization-based centralized algorithms in the literature. Our performance evaluation verifies that the proposed algorithm achieves performance improvements (at most 15.53%). IEEE
We consider a power system whose electric demand pertaining to freshwater production is high(high freshwater electric demand),as in the Middle East,and investigate the tradeoff of storing freshwater in tanks versus st...
详细信息
We consider a power system whose electric demand pertaining to freshwater production is high(high freshwater electric demand),as in the Middle East,and investigate the tradeoff of storing freshwater in tanks versus storing electricity in batteries at the day-ahead operation *** storing freshwater and storing electricity increase the actual electric demand at valley hours and decrease it at peak hours,which is generally beneficial in term of cost and ***,to what extent?We analyze this question considering three power systems with different generation-mix configurations,i.e.,a thermal-dominated mix,a renewable-dominated one,and a fully renewable *** generation-mix configurations are inspired by how power systems may evolve in different countries in the Middle *** production uncertainty is compactly modeled using chance *** draw conclusions on how both storage facilities(freshwater and electricity)complement each other to render an optimal operation of the power system.
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
As maritime activities increase globally,there is a greater dependency on technology in monitoring,control,and surveillance of vessel *** of the most prominent systems for monitoring vessel activity is the Automatic I...
详细信息
As maritime activities increase globally,there is a greater dependency on technology in monitoring,control,and surveillance of vessel *** of the most prominent systems for monitoring vessel activity is the Automatic Identification System(AIS).An increase in both vessels fitted with AIS transponders and satellite and terrestrial AIS receivers has resulted in a significant increase in AIS messages received *** resultant rich spatial and temporal data source related to vessel activity provides analysts with the ability to perform enhanced vessel movement analytics,of which a pertinent example is the improvement of vessel location *** this paper,we propose a novel strategy for predicting future locations of vessels making use of historic AIS *** proposed method uses a Linear Regression Model(LRM)and utilizes historic AIS movement data in the form of a-priori generated spatial maps of the course over ground(LRMAC).The LRMAC is an accurate low complexity first-order method that is easy to implement operationally and shows promising results in areas where there is a consistency in the directionality of historic vessel *** areas where the historic directionality of vessel movement is diverse,such as areas close to harbors and ports,the LRMAC defaults to the *** proposed LRMAC method is compared to the Single-Point Neighbor Search(SPNS),which is also a first-order method and has a similar level of computational complexity,and for the use case of predicting tanker and cargo vessel trajectories up to 8 hours into the future,the LRMAC showed improved results both in terms of prediction accuracy and execution time.
This article introduces a novel Multi-agent path planning scheme based on Conflict Based Search (CBS) for heterogeneous holonomic and non-holonomic agents, designated as Heterogeneous CBS (HCBS). The proposed methodol...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Data collection using mobile sink(s) has proven to reduce energy consumption and enhance the network lifetime of wireless sensor networks. Generally speaking, a mobile sink (MS) traverses the network region, sojournin...
详细信息
暂无评论