A method for the recognition and prevention of a black hole attack is proposed using a tree hierarchical deep convolutional neural network (THDCNN)and enhanced identity based encryption in a vehicular ad hoc network (...
详细信息
Sentence classification is the process of categorizing a sentence based on the context of the *** categorization requires more semantic highlights than other tasks,such as dependence parsing,which requires more syntac...
详细信息
Sentence classification is the process of categorizing a sentence based on the context of the *** categorization requires more semantic highlights than other tasks,such as dependence parsing,which requires more syntactic *** existing strategies focus on the general semantics of a conversation without involving the context of the sentence,recognizing the progress and comparing *** ensemble pre-trained language model was taken up here to classify the conversation sentences from the conversation *** conversational sentences are classified into four categories:information,question,directive,and *** classification label sequences are for analyzing the conversation progress and predicting the pecking order of the *** of Bidirectional Encoder for Representation of Transformer(BERT),Robustly Optimized BERT pretraining Approach(RoBERTa),Generative Pre-Trained Transformer(GPT),DistilBERT and Generalized Autoregressive Pretraining for Language Understanding(XLNet)models are trained on conversation corpus with *** tuning approach is carried out for better performance on sentence *** Ensemble of Pre-trained Language Models with a Hyperparameter Tuning(EPLM-HT)system is trained on an annotated conversation *** proposed approach outperformed compared to the base BERT,GPT,DistilBERT and XLNet transformer *** proposed ensemble model with the fine-tuned parameters achieved an F1_score of 0.88.
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces....
详细信息
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces. Large-scale data collection and annotation make the application of machine learning algorithms prohibitively expensive when adapting to new tasks. One way of circumventing this limitation is to train the model in a semi-supervised learning manner that utilizes a percentage of unlabeled data to reduce the labeling burden in prediction tasks. Despite their appeal, these models often assume that labeled and unlabeled data come from similar distributions, which leads to the domain shift problem caused by the presence of distribution gaps. To address these limitations, we propose herein a novel method for people-centric activity recognition,called domain generalization with semi-supervised learning(DGSSL), that effectively enhances the representation learning and domain alignment capabilities of a model. We first design a new autoregressive discriminator for adversarial training between unlabeled and labeled source domains, extracting domain-specific features to reduce the distribution gaps. Second, we introduce two reconstruction tasks to capture the task-specific features to avoid losing information related to representation learning while maintaining task-specific consistency. Finally, benefiting from the collaborative optimization of these two tasks, the model can accurately predict both the domain and category labels of the source domains for the classification task. We conduct extensive experiments on three real-world sensing datasets. The experimental results show that DGSSL surpasses the three state-of-the-art methods with better performance and generalization.
Various content-sharing platforms and social media are developed in recent times so that it is highly possible to spread fake news and misinformation. This kind of news may cause chaos and panic among people. The auto...
详细信息
Energy efficiency is the prime concern in Wireless Sensor Networks(WSNs) as maximized energy consumption without essentially limits the energy stability and network lifetime. Clustering is the significant approach ess...
详细信息
Energy efficiency is the prime concern in Wireless Sensor Networks(WSNs) as maximized energy consumption without essentially limits the energy stability and network lifetime. Clustering is the significant approach essential for minimizing unnecessary transmission energy consumption with sustained network lifetime. This clustering process is identified as the Non-deterministic Polynomial(NP)-hard optimization problems which has the maximized probability of being solved through metaheuristic *** adoption of hybrid metaheuristic algorithm concentrates on the identification of the optimal or nearoptimal solutions which aids in better energy stability during Cluster Head(CH) selection. In this paper,Hybrid Seagull and Whale Optimization Algorithmbased Dynamic Clustering Protocol(HSWOA-DCP)is proposed with the exploitation benefits of WOA and exploration merits of SEOA to optimal CH selection for maintaining energy stability with prolonged network lifetime. This HSWOA-DCP adopted the modified version of SEagull Optimization Algorithm(SEOA) to handle the problem of premature convergence and computational accuracy which is maximally possible during CH selection. The inclusion of SEOA into WOA improved the global searching capability during the selection of CH and prevents worst fitness nodes from being selected as CH, since the spiral attacking behavior of SEOA is similar to the bubble-net characteristics of WOA. This CH selection integrates the spiral attacking principles of SEOA and contraction surrounding mechanism of WOA for improving computation accuracy to prevent frequent election process. It also included the strategy of levy flight strategy into SEOA for potentially avoiding premature convergence to attain better trade-off between the rate of exploration and exploitation in a more effective manner. The simulation results of the proposed HSWOADCP confirmed better network survivability rate, network residual energy and network overall throughput on par wi
XStorm, an FRP language for small-scale embedded systems, allows us to concisely describe state-dependent behaviors based on the state transition model. However, when we use different sets of peripheral devices depend...
详细信息
Machine learning algorithms are used in various real-time applications, where security is one of the major problems. Security is applied in various aspects of the application in cloud computing. One of the security is...
详细信息
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal ...
详细信息
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal of this study, which is designed to prevent the deployment of fraudulent servers. Smart contract verification on the blockchain will be used to this end. The cloud assault must be prevented from accessing personal payment and card information. It is via the employment of cryptography methods that this concept of privacy reservation is made possible. The Boolean crossover depth first search (DFS) technique is used to encrypt data in the payment gateway protocol at its inception. When the hospital administrator solicits card data from patients or users, our innovative approach swiftly initiates data encryption using the DFS technique. This method meticulously traverses the data structure in a depth-first manner, employing Boolean operations to systematically encrypt sensitive information. Through this process, the patient's payment and card data undergo secure transformation, rendering it unreadable to unauthorized entities. Additionally, an authentication key is generated concurrently with the encryption process, enabling verification between the system and the user before any data transmission occurs. The integration of the DFS technique serves as a fundamental layer of defense against potential cloud-based attacks. Its application ensures the utmost protection of personal payment and card details throughout the transaction process, bolstering the security infrastructure of our proposed system. A comprehensive analysis comparing our approach with existing methods showcases the efficiency and reliability of our proposed system in terms of Execution Time (ms), Encryption Time (ms), Decryption Time (ms), and Memory (bits). This study aims to bridge the gap in transactional security, ensuring robust protection against unauthorized access and data breaches in
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
The burgeoning landscape of blockchain technology has ushered in an era of unprecedented innovation and opportunity. However, one of the most persistent challenges that emerge in this decentralized ecosystem is the la...
详细信息
The burgeoning landscape of blockchain technology has ushered in an era of unprecedented innovation and opportunity. However, one of the most persistent challenges that emerge in this decentralized ecosystem is the lack of efficient and secure interoperability mechanisms across different blockchain networks. The FlameShift Protocol introduces a ground-breaking approach to address this challenge, enabling seamless cross-chain communications through a novel Dynamic Asset Recycling (DAR) mechanism. This paper delves into the intricacies of the FlameShift Protocol, illustrating its capability to not only facilitate secure and efficient cross-chain transactions but also to enhance the liquidity and utility of digital assets across disparate blockchain ecosystems. At the heart of this protocol is the DAR mechanism, which employs a unique auto-burn and reclaim process. This process ensures that when assets are transferred from one chain to another, they are temporarily locked in the source chain, and an equivalent value is minted in the destination chain. This mechanism is designed to maintain a balanced ledger across chains without the need for centralized intermediaries, thereby mitigating the risk of double-spending and other fraudulent activities. Furthermore, the FlameShift Protocol incorporates advanced cryptographic techniques and smart contract functionalities to ensure that the asset transfer process is not only secure but also transparent and verifiable. This paper presents a comprehensive analysis of the protocol’s architecture, security features, and the potential implications for the future of blockchain interoperability. By offering a scalable, secure, and efficient framework for cross-chain communications, the FlameShift Protocol paves the way for a more interconnected and versatile blockchain ecosystem. This study aims to contribute to the ongoing discourse on blockchain interoperability, providing insights and practical solutions for developers, researcher
暂无评论