Periodic patternmining has become a popular research subject in recent years;this approach involves the discoveryof frequently recurring patterns in a transaction sequence. However, previous algorithms for periodic pa...
详细信息
Periodic patternmining has become a popular research subject in recent years;this approach involves the discoveryof frequently recurring patterns in a transaction sequence. However, previous algorithms for periodic patternmining have ignored the utility (profit, value) of patterns. Additionally, these algorithms only identify periodicpatterns in a single sequence. However, identifying patterns of high utility that are common to a set of sequencesis more valuable. In several fields, identifying high-utility periodic frequent patterns in multiple sequences isimportant. In this study, an efficient algorithm called MHUPFPS was proposed to identify such patterns. To addressexisting problems, three new measures are defined: the utility, high support, and high-utility period sequenceratios. Further, a new upper bound, upSeqRa, and two new pruning properties were proposed. MHUPFPS usesa newly defined HUPFPS-list structure to significantly accelerate the reduction of the search space and improvethe overall performance of the algorithm. Furthermore, the proposed algorithmis evaluated using several *** experimental results indicate that the algorithm is accurate and effective in filtering several non-high-utilityperiodic frequent patterns.
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Recommendation systems are crucial due to their high relevance in terms of interpretability and performance. A Social Recommendation system explores how social relations influence user choices and how users select ite...
详细信息
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ...
详细信息
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple *** different programming paradigms,such as Message Passing Interface(MPI),Open Multiple Processing(OpenMP),and Open Accelerators(OpenACC),can increase computation speed and improve *** the integration of multiple models,the probability of runtime errors increases,making their detection difficult,especially in the absence of testing techniques that can detect these *** studies have been conducted to identify these errors,but no technique exists for detecting errors in three-level programming *** the increasing research that integrates the three programming models,MPI,OpenMP,and OpenACC,a testing technology to detect runtime errors,such as deadlocks and race conditions,which can arise from this integration has not been ***,this paper begins with a definition and explanation of runtime errors that result fromintegrating the three programming models that compilers cannot *** the first time,this paper presents a classification of operational errors that can result from the integration of the three *** paper also proposes a parallel hybrid testing technique for detecting runtime errors in systems built in the C++programming language that uses the triple programming models MPI,OpenMP,and *** hybrid technology combines static technology and dynamic technology,given that some errors can be detected using static techniques,whereas others can be detected using dynamic *** hybrid technique can detect more errors because it combines two distinct *** proposed static technology detects a wide range of error types in less time,whereas a portion of the potential errors that may or may not occur depending on the 4502 CMC,2023,vol.74,no.2 operating environme
This paper introduces a novel methodology for designing secure hardware accelerator tailored for convolutional neural network (CNN) applications, leveraging security-aware high-level synthesis (HLS). The methodology o...
详细信息
With the continuous expansion of the data center, its energy consumption is also increasing. Aiming at the problem that the high redundancy of modern data center network causes low energy-consumption utilization, this...
详细信息
Emotions are a vital semantic part of human correspondence. Emotions are significant for human correspondence as well as basic for human–computer cooperation. Viable correspondence between people is possibly achieved...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security of the *** intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system *** this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot *** this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant *** proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO *** results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness *** a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.
Vehicle cloud computing (VCC) is a recent area of study that blends vehicular networks with cloud computing, offering networking and sensor capabilities to vehicles for interaction with other vehicles and roadside inf...
详细信息
暂无评论