Human behavior analysis and visual anomaly detection are important applications in fields such as video surveillance, security systems, intelligent houses, and elderly care. People re-identification is one of the main...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref...
详细信息
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;therefore,theuse of anauto-encoder for compressionbefore encodingwill solve such a *** this paper,we use an auto-encoder to compress amedical image before encryption,and an encryption output(vector)is sent out over the *** the other hand,a decoder was used to reproduce the original image back after the vector was received and *** convolutional neural networks were conducted to evaluate our proposed approach:The first one is the auto-encoder,which is utilized to compress and encrypt the images,and the other assesses the classification accuracy of the image after decryption and *** hyperparameters of the encoder were tested,followed by the classification of the image to verify that no critical information was lost,to test the encryption and encoding *** this approach,sixteen hyperparameter permutations are utilized,but this research discusses three main cases in *** first case shows that the combination of Mean Square Logarithmic Error(MSLE),ADAgrad,two layers for the auto-encoder,and ReLU had the best auto-encoder results with a Mean Absolute Error(MAE)=0.221 after 50 epochs and 75%classification with the best result for the classification *** second case shows the reflection of auto-encoder results on the classification results which is a combination ofMean Square Error(MSE),RMSprop,three layers for the auto-encoder,and ReLU,which had the best classification accuracy of 65%,the auto-encoder gives MAE=0.31 after 50 *** third case is the worst,which is the combination of the hinge,RMSprop,three layers for the auto-encoder,and ReLU,providing accuracy of 20%and MAE=0.485.
Although thermography has been proposed over the past decade as an effective method for breast cancer diagnosis, the complexity of thermograms presents a significant obstacle, making their interpretation challenging. ...
详细信息
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offsho...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offshore oil and gas processing plants and have been mandated in the design of such systems from national and international standards and *** paper has used actual ESDV operating data from four mid/late life oil and gas production platforms in the North Sea to research operational relationships that are of interest to those responsible for the technical management and operation of *** first of the two relationships is between the closure time(CT)of the ESDV and the time it remains in the open position,prior to the close *** has been hypothesised that the CT of the ESDV is affected by the length of time that it has been open prior to being closed(Time since the last stroke).In addition to the general analysis of the data series,two sub-categories were created to further investigate this possible relationship for CT and these are“above mean”and“below mean”.The correlations(Pearson's based)resulting from this analysis are in the“weak”and“very weak”*** second relationship investigated was the effect of very frequent closures to assess if this improves the *** operational records for six subjects were analysed to find closures that occurred within a 24 h period of each ***,no discriminating trend was apparent where CT was impacted positively or negatively by the frequent closure *** was concluded that the variance of ESDV closure time cannot be influenced by the technical management of the ESDV in terms of scheduling the operation of the ESDV.
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
Autism Spectrum Disorder (ASD) is a developmental condition resulting from abnormalities in brain structure and function, which can manifest as communication and social interaction difficulties. Conventional methods f...
详细信息
Fog computing offers a compelling paradigm for real-time healthcare data processing by minimizing latency and bringing computation closer to its source. However, efficient service placement remains a critical challeng...
详细信息
Early detection of cutaneous malignancies remains a critical challenge in healthcare. This study proposes an approach to skin lesion classification using the SLICE-3D dataset, containing over 400,000 smartphone-qualit...
详细信息
暂无评论