Long-term care refers to any support, both medical and non-medical, provided to the elderly with a chronic illness or disability due to physical or mental conditions. Since the cost of long-term care insurance is not ...
详细信息
With the rapid development of artificial intelligence and the Internet of Things,along with the growing demand for privacy-preserving transmission,the need for efficient and secure communication systems has become inc...
详细信息
With the rapid development of artificial intelligence and the Internet of Things,along with the growing demand for privacy-preserving transmission,the need for efficient and secure communication systems has become increasingly *** communication methods transmit data at the bit level without considering its semantic significance,leading to redundant transmission overhead and reduced *** communication addresses this issue by extracting and transmitting only the mostmeaningful semantic information,thereby improving bandwidth ***,despite reducing the volume of data,it remains vulnerable to privacy risks,as semantic features may still expose sensitive *** address this,we propose an entropy-bottleneck-based privacy protection mechanism for semantic *** approach uses semantic segmentation to partition images into regions of interest(ROI)and regions of non-interest(RONI)based on the receiver’s needs,enabling differentiated semantic *** focusing transmission on ROIs,bandwidth usage is optimized,and non-essential data is *** entropy bottleneck model probabilistically encodes the semantic information into a compact bit stream,reducing correlation between the transmitted content and the original data,thus enhancing privacy *** proposed framework is systematically evaluated in terms of compression efficiency,semantic fidelity,and privacy *** comparative experiments with traditional and state-of-the-art methods,we demonstrate that the approach significantly reduces data transmission,maintains the quality of semantically important regions,and ensures robust privacy protection.
In the current landscape of the COVID-19 pandemic,the utilization of deep learning in medical imaging,especially in chest computed tomography(CT)scan analysis for virus detection,has become increasingly *** its potent...
详细信息
In the current landscape of the COVID-19 pandemic,the utilization of deep learning in medical imaging,especially in chest computed tomography(CT)scan analysis for virus detection,has become increasingly *** its potential,deep learning’s“black box”nature has been a major impediment to its broader acceptance in clinical environments,where transparency in decision-making is *** bridge this gap,our research integrates Explainable AI(XAI)techniques,specifically the Local Interpretable Model-Agnostic Explanations(LIME)method,with advanced deep learning *** integration forms a sophisticated and transparent framework for COVID-19 identification,enhancing the capability of standard Convolutional Neural Network(CNN)models through transfer learning and data *** approach leverages the refined DenseNet201 architecture for superior feature extraction and employs data augmentation strategies to foster robust model *** pivotal element of our methodology is the use of LIME,which demystifies the AI decision-making process,providing clinicians with clear,interpretable insights into the AI’s *** unique combination of an optimized Deep Neural Network(DNN)with LIME not only elevates the precision in detecting COVID-19 cases but also equips healthcare professionals with a deeper understanding of the diagnostic *** method,validated on the SARS-COV-2 CT-Scan dataset,demonstrates exceptional diagnostic accuracy,with performance metrics that reinforce its potential for seamless integration into modern healthcare *** innovative approach marks a significant advancement in creating explainable and trustworthy AI tools for medical decisionmaking in the ongoing battle against COVID-19.
In the realm of low-level vision tasks,such as image deraining and dehazing,restoring images distorted by adverse weather conditions remains a significant *** emergence of abundant computational resources has driven t...
详细信息
In the realm of low-level vision tasks,such as image deraining and dehazing,restoring images distorted by adverse weather conditions remains a significant *** emergence of abundant computational resources has driven the dominance of deep Convolutional Neural Networks(CNNs),supplanting traditional methods reliant on prior ***,the evolution of CNN architectures has tended towards increasing complexity,utilizing intricate structures to enhance performance,often at the expense of computational *** response,we propose the Selective Kernel Dense Residual M-shaped Network(SKDRMNet),a flexible solution adept at balancing computational efficiency with network accuracy.A key innovation is the incorporation of an M-shaped hierarchical structure,derived from the U-Net framework as M-Network(M-Net),within which the Selective Kernel Dense Residual Module(SDRM)is introduced to reinforce multi-scale semantic feature *** methodology employs two sampling techniques-bilinear and pixel unshuffled and utilizes a multi-scale feature fusion approach to distil more robust spatial feature map *** the reconstruction phase,feature maps of varying resolutions are seamlessly integrated,and the extracted features are effectively merged using the Selective Kernel Fusion Module(SKFM).Empirical results demonstrate the comprehensive superiority of SKDRMNet across both synthetic and real rain and haze datasets.
Coronavirus belongs to the family of Coronaviridae. It is responsible for COVID-19 communicable disease, which has affected 213 countries and territories worldwide. Researchers in computational fields have been active...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled smart *** high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for ***,there is a high computation latency due to the presence of a remote cloud *** computing,which brings the computation close to the data source is introduced to overcome this *** an IoT-enabled smart city environment,one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay *** efficient resource allocation at the edge is helpful to address this *** this paper,an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation ***,we presented a three-layer network architecture for IoT-enabled smart ***,we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization *** Automata(LA)is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource *** extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
The enhancement of Intrusion Detection Systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and at...
详细信息
The rapid expansion of IoT technology has given rise to smart cities, but their complex architecture poses security challenges at various levels. This paper introduces a systematic literature review method to investig...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering *** proposed version employs a network-based reputation system to select the best and most secure path to a *** achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation *** minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation ***,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast *** proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other *** the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing *** paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different ***,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and ...
详细信息
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and acquire contextual information hinders their *** propose a Text Augmentation-based computational model for recognizing emotions using transformers(TA-MERT)to address *** proposed model uses the Multimodal Emotion Lines Dataset(MELD),which ensures a balanced representation for recognizing human *** used text augmentation techniques to producemore training data,improving the proposed model’s *** encoders train the deep neural network(DNN)model,especially Bidirectional Encoder(BE)representations that capture both forward and backward contextual *** integration improves the accuracy and robustness of the proposed ***,we present a method for balancing the training dataset by creating enhanced samples from the original *** balancing the dataset across all emotion categories,we can lessen the adverse effects of data imbalance on the accuracy of the proposed *** results on the MELD dataset show that TA-MERT outperforms earlier methods,achieving a weighted F1 score of 62.60%and an accuracy of 64.36%.Overall,the proposed TA-MERT model solves the GBN models’weaknesses in obtaining contextual data for ***-MERT model recognizes human emotions more accurately by employing text augmentation and transformer-based *** balanced dataset and the additional training samples also enhance its *** findings highlight the significance of transformer-based approaches for special emotion recognition in conversations.
暂无评论