Millions of cases of tuberculosis (TB) are recorded each year, making it a significant worldwide health concern. Early and accurate TB detection is essential for the disease to be effectively treated and controlled. D...
详细信息
The LLaMA family, a collection of foundation language models ranging from 7B to 65B parameters, has become one of the most powerful open-source large language models (LLMs) and the popular LLM backbone of multi-modal ...
详细信息
During the development of control strategies for permanent magnet synchronous machines (PMSM) used in wind turbines, usage of wide range of simulation allows for more detailed, more safe and less expensive development...
详细信息
A location's Take-up Rate was significantly influenced by its Internet connectivity and availability. The purpose of this research is to answer concerns about internal Internet Service Provider issues that affect ...
详细信息
With the extensive penetration of distributed renewable energy and self-interested prosumers,the emerging power market tends to enable user autonomy by bottom-up control and distributed *** paper is devoted to solving...
详细信息
With the extensive penetration of distributed renewable energy and self-interested prosumers,the emerging power market tends to enable user autonomy by bottom-up control and distributed *** paper is devoted to solving the specific problems of distributed energy management and autonomous bidding and peer-to-peer(P2P)energy sharing among prosumers.A novel cloud-edge-based We-Market is presented,where the prosumers,as edge nodes with independent control,balance the electricity cost and thermal comfort by formulating a dynamic household energy management system(HEMS).Meanwhile,the autonomous bidding is initiated by prosumers via the modified Stone-Geary utility *** the cloud center,a distributed convergence bidding(CB)algorithm based on consistency criterion is developed,which promotes faster and fairer bidding through the interactive iteration with the edge ***,the proposed scheme is built on top of the commercial cloud platform with sufficiently secure and scalable computing *** results show the effectiveness and practicability of the proposed We-Market,which achieves 15%cost reduction with shorter running *** analysis indicates better scalability,which is more suitable for largerscale We-Market implementation.
ElectrodeNet, a deep-learning-based sound coding strategy for the cochlear implant (CI), is proposed to emulate the advanced combination encoder (ACE) strategy by replacing the conventional envelope detection using va...
详细信息
Innovative grid technology leverages Information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home...
详细信息
In Non-Orthogonal Multiple Access (NOMA) wireless networks, base station broadcasts the aggregated contents to all users, where short-distance users have stronger signals compared with long-distance users. Stronger si...
详细信息
Pain is a multidimensional and highly personalized sensation that affects individuals’ physical and emotional state. Visual analog scales, numeric rate indicators, and various questionnaires, all relying on patient-r...
详细信息
Authentication of the digital image has much attention for the digital *** image authentication can be verified with image watermarking and image encryption *** schemes are widely used to protect images against forger...
详细信息
Authentication of the digital image has much attention for the digital *** image authentication can be verified with image watermarking and image encryption *** schemes are widely used to protect images against forgery attacks,and they are useful for protecting copyright and rightful *** on the desirable applications,several image encryption and watermarking schemes have been proposed to moderate this *** framework presents a new scheme that combines a Walsh Hadamard Transform(WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding(DRPE).First,on the sender side,the secret medical image is encrypted using *** the encrypted image is watermarking based on *** combination between watermarking and encryption increases the security and robustness of transmitting an *** performance evaluation of the proposed scheme is obtained by testing Structural Similarity Index(SSIM),Peak Signal-to-Noise Ratio(PSNR),Normalized cross-correlation(NC),and Feature Similarity Index(FSIM).
暂无评论