In this work, we study the problem of skin cancer diagnosis from images by employing a network of collaborating institutions (e.g, hospitals) that cooperate under the emerging federated learning protocol. In such a sc...
详细信息
ISBN:
(数字)9798350313338
ISBN:
(纸本)9798350313345
In this work, we study the problem of skin cancer diagnosis from images by employing a network of collaborating institutions (e.g, hospitals) that cooperate under the emerging federated learning protocol. In such a scenario, the problems of not exposing sensitive patient information as well as the heterogeneity of the participating devices are of paramount importance. To this end, we propose the use of deep equilibrium models, in place of some other "traditional" deep neural network model, that offer a natural means of dealing with devices that have different computational resources. Furthermore, to prevent the leakage of sensitive information, the models exchanged in the proposed approach are homo-morpically encrypted. Numerical results indicate that the proposed approach offers the same accuracy as compared to the state-of-the-art federated learning case that "traditional" deep-learning models, but with three significant advantages: (a) increased privacy, (b) support of heterogeneous devices, and (c) significantly reduced communication requirements.
This paper considers key issues surrounding energy consumption by information and communication technologies (ICT), which has been steadily growing and is now attaining approximately 10% of the worldwide electricity c...
This paper considers key issues surrounding energy consumption by information and communication technologies (ICT), which has been steadily growing and is now attaining approximately 10% of the worldwide electricity consumption with a significant impact on greenhouse gas emissions. The perimeter of ICT systems is discussed, and the role of the subsystems that compose ICT is considered. Data from recent years is used to understand how each of these sub-systems contribute to ICT's energy consumption. The quantitatively demonstrated positive correlation between the penetration of ICT in the world's different economies and the same economies' contributions to undesirable greenhouse gas emissions is also discussed. The paper also examines how emerging technologies such as 5G, AI, edge computing, and cryptocurrencies are contributing to the worldwide increase in electricity consumption by ICT, despite the increases in ICT efficiency, in terms of energy consumed per bit processed, stored, or transmitted. The measurement of specific ICT systems' electricity consumption is also addressed, and the manner in which this consumption can be minimized in a specific edge computing context is discussed.
Nowadays., the advancement of artificial intelligence has led to the application of robotic systems in the industry, especially in the hotel industry, with a view to providing intelligent, automated and luxury service...
详细信息
The human voice is critical in recognizing the speaker’s identity and gender. This study aims to develop an effective gender detection system using short utterances of less than one second. Wavelet Cepstral Coefficie...
详细信息
ISBN:
(数字)9798331519643
ISBN:
(纸本)9798331519650
The human voice is critical in recognizing the speaker’s identity and gender. This study aims to develop an effective gender detection system using short utterances of less than one second. Wavelet Cepstral Coefficient (WCC) features were used for feature extraction, and a Long Short-Term Memory (LSTM) model was applied for classification. Primary and secondary short voice datasets, including syllables and the Audio MNIST dataset, underwent acoustic pretreatment and were trained using LSTM architectures with 32, 64, and 128 units. Results indicated that the LSTM model achieved high accuracy, with the syllable dataset reaching 0.99 accuracy and the Audio MNIST dataset showing perfect accuracy (1.00) using a 32-unit configuration. The findings demonstrate that combining WCC features and LSTM models can efficiently handle short-duration speech for accurate gender detection.
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue...
详细信息
Hate speech and abusive language on social media can spread massively and escalate into conflict between two or more individuals or parties. Previous studies about multi-label classification to identify whether the tw...
Hate speech and abusive language on social media can spread massively and escalate into conflict between two or more individuals or parties. Previous studies about multi-label classification to identify whether the tweet contains hate speech, abusive language, or not have been conducted with machine learning techniques. They applied machine learning with a combination of feature extraction and achieved a good result in recognizing the tweet with hate speech content. In this research, we apply two approaches: first, we use vanilla pre-trained models of IndoBERT, IndoBERTweet, and Indonesian RoBERTa; second, we combine the three previous models with CNN. Our experiment shows that our proposed method has better results compared to previous research with the best performance achieved by IndoBERTweet+CNN with 93.9% Accuracy.
Access to well-curated large datasets remains a significant bottleneck in AI-based research within wireless communication. Rapid advancements in neighbouring fields, such as computer vision and natural language proces...
详细信息
Physical Full Duplex (FD) operation in WLANs is a promising technology aiming at substituting the traditional Half Duplex (HD) functionality. An increased performance is expected which, theoretically, can be expressed...
Physical Full Duplex (FD) operation in WLANs is a promising technology aiming at substituting the traditional Half Duplex (HD) functionality. An increased performance is expected which, theoretically, can be expressed as a double increase in system throughput. However, due to the initial design of the basic access method in WLANs, known as Distributed Coordination Function (DCF), this performance boost is poorly exhibited. Game theory is an invaluable tool to model the performance of Medium Access Control (MAC) protocols used in WLANs. In this paper, we exploit game theory to propose a simple enhancement to the DCF access method, in order to increase the benefit received when the FD capability is enabled in ad-hoc WLANs.
Internetworks with a large number of routing devices that utilise the Open Shortest Path First (OSPF) routing protocol, benefit greatly if they are designed in a hierarchical manner. The multi-area feature of OSPF lea...
Internetworks with a large number of routing devices that utilise the Open Shortest Path First (OSPF) routing protocol, benefit greatly if they are designed in a hierarchical manner. The multi-area feature of OSPF leads to reduced network overhead, low processing and memory requirements and smaller routing tables. This, however, comes at the cost of increased configuration complexity, especially at the Area Border Routers. The threshold after which splitting the OSPF domain into multiple areas, is an ongoing debate among network administrators. A well known rule-of-thumb is recommended by large vendors of networking devices setting that threshold to 50 routing devices. The objective of this preliminary work is to investigate that threshold by conducting a simulation-based study using the OPNET network simulation tool. To assess the network performance, we select the network convergence duration as the quantitative Key Performance Indicator (KPI) of our study. Results indicate that the above mentioned threshold does not appear to be appropriate and a revision of that empirical rule should be considered.
Network Traffic prediction is the prerequisite for proactive traffic management, where a longer duration and high accuracy of prediction ensures a more effective solution. This paper exploits Generative Adversarial Ne...
详细信息
暂无评论