The dramatic growth of smart devices and the Internet of things (IoT) has increased the volume of exchanges and data on the web. The centralized and traditional architecture of cloud computing does not meet the demand...
详细信息
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals...
详细信息
Artificial intelligence (AI) is increasingly recognized as a transformative tool in emergency department (ED) triage. Traditional triage methods, such as the Emergency Severity Index (ESI) and the Canadian Triage and ...
详细信息
Ambiguity is an inherent feature of language, whose management is crucial for effective communication and collaboration. This is particularly true for Chinese, a language with extensive lexical-morphemic ambiguity. De...
This review evaluates the complementary roles of Large Language Models (LLMs) and smart monitoring devices in stress management, aiming to identify synergies for improved mental health solutions. It explores the evolu...
详细信息
This review examines emotion recognition from physiological signals, focusing on processing methods and classification techniques. Key aspects include signal acquisition challenges, emotion elicitation strategies, and...
详细信息
Background: The automated classification of videos through artificial neural networks is addressed in this work. To explore the concepts and measure the results, the data set UCF101 is used, consisting of video clips ...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteri...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteristics, offers unparalleled precision in individual identification. However, the integrity and confidentiality of biometric data remain paramount concerns, given its susceptibility to compromise. This research delineates the development and implementation of an innovative framework for cancellable biometrics, focusing on facial and fingerprint recognition. This study introduces a novel cancellable biometrics framework that integrates graph theory encryption with three-dimensional chaotic logistic mapping. The methodology encompasses a multifaceted approach: initially employing graph theory for the secure and efficient encryption of biometric data, subsequently enhanced by the complexity and unpredictability of three-dimensional chaotic logistic mapping. This dual-layered strategy ensures the robustness of the encryption, thereby significantly elevating the security of biometric data against unauthorized access and potential compromise. Thus, the resulting cancellable biometrics, characterized by the ability to transform biometric data into an adjustable representation, addresses critical challenges in biometric security. It allows for the revocation and reissuance of biometric credentials, thereby safeguarding the original biometric characteristics of individuals. This feature not only enhances user privacy and data security but also introduces a dynamic aspect to biometric authentication, facilitating adaptability across diverse systems and applications. Preliminary evaluations of the proposed framework demonstrate a marked improvement in the security of face and fingerprint recognition systems. Through the application of graph theory encryption, coupled with three-dimensional chaotic logistic mapping, our framework mitigates the risks associated with t
Retrofitting projects play a critical role in enhancing the sustainability of existing structures, yet balancing time, cost, and environmental impact remains a significant challenge for decision-makers. This study int...
详细信息
Topic modeling is widely used for analyzing large textual datasets, particularly in technology patent nomination. Traditional methods, such as Latent Dirichlet Allocation (LDA) and Non-Negative Matrix Factorization (N...
详细信息
暂无评论