This paper presents a study on the effect of using a smaller number of inputs in the FPGA logic block calculated according to a pre-compiled model based on Rent's rule. This rule, when applied to the FPGA logic bl...
详细信息
We address a problem involving a buyer seeking to train a logistic regression model by acquiring data from privacy-sensitive sellers. Along with compensating the sellers for their data, the buyer provides differential...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
We address a problem involving a buyer seeking to train a logistic regression model by acquiring data from privacy-sensitive sellers. Along with compensating the sellers for their data, the buyer provides differential privacy guarantees to them where the payments depend on the privacy guarantees. In addition, each seller has a different privacy sensitivity associated with their data, which is the cost per unit of loss of privacy. The buyer transacts sequentially with the sellers, wherein the seller will disclose their privacy sensitivity, and the buyer immediately provides a payment and guarantees differential privacy. After receiving the payment, the seller provides their data to the buyer. The buyer’s goal is to optimize a weighted combination of test loss and payments, i.e., achieve a tradeoff between getting a good ML model and limiting its payments. Additionally, the buyer must design the payments and differential privacy guarantees in an online fashion. Further, the online problem is historydependent, which adds to the challenge. Consequently, we design a payment mechanism that ensures incentive compatibility and individual rationality and is asymptotically optimal. Additionally, we also provide experimental results to validate our findings.
Breast cancer is a type of cancer responsible for higher mortality rates among *** cruelty of breast cancer always requires a promising approach for its earlier *** light of this,the proposed research leverages the re...
详细信息
Breast cancer is a type of cancer responsible for higher mortality rates among *** cruelty of breast cancer always requires a promising approach for its earlier *** light of this,the proposed research leverages the representation ability of pretrained EfficientNet-B0 model and the classification ability of the XGBoost model for the binary classification of breast *** addition,the above transfer learning model is modified in such a way that it will focus more on tumor cells in the input ***,the work proposed an EfficientNet-B0 having a Spatial Attention Layer with XGBoost(ESA-XGBNet)for binary classification of *** this,the work is trained,tested,and validated using original and augmented mammogram images of three public datasets namely CBIS-DDSM,INbreast,and MIAS *** accuracy of 97.585%(CBISDDSM),98.255%(INbreast),and 98.91%(MIAS)is obtained using the proposed ESA-XGBNet architecture as compared with the existing ***,the decision-making of the proposed ESA-XGBNet architecture is visualized and validated using the Attention Guided GradCAM-based Explainable AI technique.
This note shows two design examples of PID con-Trollers, whose state variables estimate the selected state vari-Ables of the controlled plant systems, for LTI Parametrically Dependent (LTIPD) systems. The authors have...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
This paper presents a signal processing framework for automatic anxiety level classification in a virtual reality exposure therapy system. Two types of biophysical data (heart rate and electrodermal activity) were rec...
详细信息
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it ...
详细信息
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it challengingto be predicted accurately. Many of the existing approaches forpredicting wireless network traffic are unable to produce accurate predictionsbecause they lack the ability to describe the dynamic spatial-temporalcorrelations of wireless network traffic data. In this paper, we proposed anovel meta-heuristic optimization approach based on fitness grey wolf anddipper throated optimization algorithms for boosting the prediction accuracyof traffic volume. The proposed algorithm is employed to optimize the hyperparametersof long short-term memory (LSTM) network as an efficient timeseries modeling approach which is widely used in sequence prediction *** prove the superiority of the proposed algorithm, four other optimizationalgorithms were employed to optimize LSTM, and the results were *** evaluation results confirmed the effectiveness of the proposed approachin predicting the traffic of wireless networks accurately. On the other hand,a statistical analysis is performed to emphasize the stability of the proposedapproach.
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r...
详细信息
Digital technologies are becoming increasingly complex and integrated, leading to significant transformations in society and the economy. The article aims to explore and summarize the new opportunities and potential r...
详细信息
ISBN:
(纸本)9781917204149
Digital technologies are becoming increasingly complex and integrated, leading to significant transformations in society and the economy. The article aims to explore and summarize the new opportunities and potential risks of the widespread use of artificial intelligence (AI) in all aspects of life, to define the new skills and necessary knowledge of digital entrepreneurs and to highlight the need for transformation in modern education. Recognizing that the relationship between technology and business is two-way and becoming stronger, revealing that well-prepared employees are a guarantee of success and prosperity of companies in various fields, we try to focus on the main groups of qualities, skills and basic knowledge of students in the age of artificial intelligence. The development of the Internet, expansion of connectivity through social networks, the advent of AI, 3D printing, and immersive technologies like Augmented Reality, and Virtual Reality, require new knowledge and skills, leading to new challenges in education. Qualified personnel in this modern world must have solid professional training and systemic thinking (knowledge, skills, accumulated information), developed cognitive abilities, and personal skills based on collecting and analyzing large amounts of diverse information from heterogeneous sources. Questions arise: how can multiple information sources be combined effectively, and how can the fusion of multiple sources provide additional information to support decision-making processes? Combining information obtained from the real world makes the results heterogeneous and more informative. It follows the need to develop machine learning methods to extract relevant information from increasingly complex data sets. The goal is to improve the accuracy of the applied classification algorithms by combining predictions from multiple models, as well as obtaining a more stable final classification evaluation, effective handling of noisy data, adaptation to c
Introducing smart intrusion detection systems (IDSs) in the IoT system was a crucial requirement in the last decades to secure these systems due to the high sensitivity of the sensed data. Smart IDS has often been bui...
详细信息
暂无评论