Nowadays, text is one prevalent forms of data and text classification is a widely used data mining task, which has various application fields. One mass-produced instance of text is email. As a communication medium, de...
详细信息
The study of the Genome-wide association study (GWAS) and the complex diseases is of high importance nowadays. The epistasis describes the analysis of the single nucleotide polymorphisms (SNPs) interactions and their ...
详细信息
In a platoon communication scenario, the Platoon Leader (PL) vehicle interacts with the gNodeB (gNB) to obtain some assigned radio resources and then the obtained radio resources are allocated to the PL vehicle and it...
详细信息
Since most data-driven systems including classifiers require large amounts of complete data, the task of handling missing data has garnered much attention. If one of the variables under study in a dataset has some inc...
详细信息
Plastic waste has become one of the most prevailing environmental concerns in modern society. Without proper environmental control policies and regulations in place, we have witnessed plastic garbage being irresponsib...
详细信息
During the last few years, several real-life applications have attempted to utilize the proven high capabilities of artificial intelligence in general and machine learning in particular. Machine learning has been util...
详细信息
Currently, Software-Defined Network (SDN) is as one of the most commonly used network architectures. It requires using a software-based, centralized controller to communicate with the underlying network hardware to co...
详细信息
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industr...
详细信息
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industry and *** blockchain is based on a distributed network and has the characteristics of non-tampering and traceability of block *** is thus naturally able to solve the security problems of the sensor ***,this paper first analyzes the security risks associated with data storage in the sensor networks,then proposes using blockchain technology to ensure that data storage in the sensor networks is *** the traditional blockchain,the data layer uses a Merkle hash tree to store data;however,the Merkle hash tree cannot provide non-member proof,which makes it unable to resist the attacks of malicious nodes in *** solve this problem,this paper utilizes a cryptographic accumulator rather than a Merkle hash tree to provide both member proof and non-member ***,the number of elements in the existing accumulator is limited and unable to meet the blockchain’s expansion *** paper therefore proposes a new type of unbounded accumulator and provides its definition and security ***,this paper constructs an unbounded accumulator scheme using bilinear pairs and analyzes its performance.
Anomaly detection based on Generative Adversarial Networks (GANs) has been demonstrated its superiority on in imaging area. However, most existing GAN-based methods require noise-free datasets to accurately train the ...
详细信息
In this paper, we assess QoE of video and audio transmission over wireless LANs. This study tries to employ different AMC mechanis m for each medium. We consider four AMC methods: ARF, AARF, AARF-CD, and CARA. Through...
详细信息
暂无评论