Traditional navigational bronchoscopy procedures rely on preprocedural computed tomography (CT) and intraoperative chest radiography and cone-beam CT (CBCT) to biopsy peripheral lung lesions. This navigational approac...
详细信息
Pulmonary cancer is one of the most commonly diagnosed and fatal cancers and is often diagnosed by incidental findings on computed tomography. Automated pulmonary nodule detection is an essential part of computer-aide...
详细信息
Recently, the fast development of Large Language Models (LLMs) such as ChatGPT has significantly advanced NLP tasks by enhancing the capabilities of conversational models. However, the application of LLMs in the recom...
详细信息
The graph with complex annotations is the most potent data type, whose constantly evolving motivates further exploration of the unsupervised dynamic graph representation. One of the representative paradigms is graph c...
详细信息
The rapid development of the low-altitude economy (LAE) has significantly increased the utilization of autonomous aerial vehicles (AAVs) in various applications, necessitating efficient and secure communication method...
详细信息
The rapid development of the low-altitude economy (LAE) has significantly increased the utilization of autonomous aerial vehicles (AAVs) in various applications, necessitating efficient and secure communication methods among AAV swarms. In this work, we aim to introduce distributed collaborative beamforming (DCB) into AAV swarms and handle the eavesdropper collusion by controlling the corresponding signal distributions. Specifically, we consider a two-way DCB-enabled aerial communication between two AAV swarms and construct these swarms as two AAV virtual antenna arrays. Then, we minimize the two-way known secrecy capacity and maximum sidelobe level to avoid information leakage from the known and unknown eavesdroppers, respectively. Simultaneously, we also minimize the energy consumption of AAVs when constructing virtual antenna arrays. Due to the conflicting relationships between secure performance and energy efficiency, we consider these objectives by formulating a multi-objective optimization problem, which is NP-hard and with a large number of decision variables. Accordingly, we design a novel generative swarm intelligence (GenSI) framework to solve the problem with less overhead, which contains a conditional variational autoencoder (CVAE)-based generative method and a proposed powerful swarm intelligence algorithm. In this framework, CVAE can collect expert solutions obtained by the swarm intelligence algorithm in other environment states to explore characteristics and patterns, thereby directly generating high-quality initial solutions in new environment factors for the swarm intelligence algorithm to search solution space efficiently. Simulation results show that the proposed swarm intelligence algorithm outperforms other state-of-the-art baseline algorithms, and the GenSI can achieve similar optimization results by using far fewer iterations than the ordinary swarm intelligence algorithm. Experimental tests demonstrate that introducing the CVAE mechanism ach
In recent years, palmprints have been widely used for individual verification. The rich privacy information in palmprint data necessitates its protection to ensure security and privacy without sacrificing system perfo...
详细信息
This research introduces an approach named “Cloud-Driven Personalized Experience Enhancement” to satisfy the escalating demand for enhanced digital connectivity. Via cutting-edge cloud services and applications, the...
详细信息
ISBN:
(数字)9798350350067
ISBN:
(纸本)9798350350074
This research introduces an approach named “Cloud-Driven Personalized Experience Enhancement” to satisfy the escalating demand for enhanced digital connectivity. Via cutting-edge cloud services and applications, the CPExE framework provides a groundbreaking solution for digital platforms. The framework is built upon three core components: Together with the Quantum-Inspired data Analytics and Evaluation (QIDAE) and Personalized Content Recommendations (PRA), Dynamic Resource Allocation and Adaptation (DRAA) completes the framework. By leveraging quantum-inspired approaches, QIDAE analyzes vast datasets with outstanding effectiveness and exactness improving processes for data handling and personalization. This strategy allows for swift detection of patterns while making certain that data-driven understandings are both on time and precise. By changing cloud resources according to user requests the DRAA module guarantees uninterrupted access to computing power and data storage. By managing resources effectively in real-time it decreases latency and improves service speeds. By using complex algorithms to assess user habits and choices the PRA system boosts the digital experience. PRA uses both content-focused filtering and collaborative screening strategies to provide users with engaging content that matches their unique preferences. By applying sophisticated analytics and resource management methods with content personalization CPExE boosts the user experience and develops cloud technology efficiency. This framework signifies an important progress toward developing dynamic and tailored online environments.
Task offloading management in 6G vehicular net-works is crucial for maintaining network efficiency, particularly as vehicles generate substantial data. Integrating secure communication through authentication introduce...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
Task offloading management in 6G vehicular net-works is crucial for maintaining network efficiency, particularly as vehicles generate substantial data. Integrating secure communication through authentication introduces additional computational and communication overhead, significantly impacting offloading efficiency and latency. This paper presents a unified framework incorporating lightweight Identity-Based Cryptographic (IBC) authentication into task offloading within cloud-based 6G Vehicular Twin Networks (VTNs). Utilizing Proximal Policy Optimization (PPO) in Deep Reinforcement Learning (DRL), our approach optimizes authenticated offloading decisions to minimize latency and enhance resource allocation. Performance evaluation under varying network sizes, task sizes, and data rates reveals that IBC authentication can reduce offloading efficiency by up to 50 % due to the added overhead. Besides, increasing network size and task size can further reduce offloading efficiency by up to 91.7%. As a countermeasure, increasing the transmission data rate can improve the offloading performance by as much as 63%, even in the presence of authentication overhead. The code for the simulations and experiments detailed in this paper is available on GitHub for further reference and reproducibility [1].
Federated Learning, as a popular paradigm for collaborative training, is vulnerable against privacy attacks. Different privacy levels regarding users’ attitudes need to be satisfied locally, while a strict privacy gu...
详细信息
The low-altitude economy (LAE), driven by unmanned aerial vehicles (UAVs) and other aircraft, has revolutionized fields such as transportation, agriculture, and environmental monitoring. In the upcoming six-generation...
详细信息
暂无评论