Graphs are valuable data structures used to represent complex relationships between entities in a wide range of applications, such as social networks and chemical reactions. Subgraph counting problem is a well-known h...
详细信息
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ...
详细信息
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a balance between data benefits and privacy threats,leading to conservative data uploads and low revenue or excessive uploads and privacy *** solve this problem,a Dynamic Privacy Measurement and Protection(DPMP)framework is proposed based on differential privacy and reinforcement ***,a DPM model is designed to quantify the amount of data privacy,and a calculation method for personalized privacy threshold of different users is also ***,a Dynamic Private sensing data Selection(DPS)algorithm is proposed to help sensing users maximize data benefits within their privacy ***,theoretical analysis and ample experiment results show that DPMP framework is effective and efficient to achieve a balance between data benefits and sensing user privacy protection,in particular,the proposed DPMP framework has 63%and 23%higher training efficiency and data benefits,respectively,compared to the Monte Carlo algorithm.
This paper addresses the problem of predicting consumer behavior in live webcast banding and explores the application of machine learning algorithms in this field and their effectiveness. The study mainly focuses on t...
详细信息
Guiding enterprises towards green technology innovation (GTI) is a pivotal strategy for mitigating pollution and energy wastage, thereby facilitating the transition towards a green and low-carbon economy. In order to ...
详细信息
In the field of computational intelligence and data analytics, the detection of fake food reviews has emerged as a pressing challenge, exacerbated by the widespread use of social media. These fraudulent reviews, parti...
详细信息
Computer vision(CV)algorithms have been extensively used for a myriad of applications *** the multimedia data are generally well-formatted and regular,it is beneficial to leverage the massive parallel processing power...
详细信息
Computer vision(CV)algorithms have been extensively used for a myriad of applications *** the multimedia data are generally well-formatted and regular,it is beneficial to leverage the massive parallel processing power of the underlying platform to improve the performances of CV *** Instruction Multiple data(SIMD)instructions,capable of conducting the same operation on multiple data items in a single instruction,are extensively employed to improve the efficiency of CV *** this paper,we evaluate the power and effectiveness of RISC-V vector extension(RV-V)on typical CV algorithms,such as Gray Scale,Mean Filter,and Edge *** our examinations,we show that compared with the baseline OpenCV implementation using scalar instructions,the equivalent implementations using the RV-V(version 0.8)can reduce the instruction count of the same CV algorithm up to 24x,when processing the same input ***,the actual performances improvement measured by the cycle counts is highly related with the specific implementation of the underlying RV-V *** our evaluation,by using the vector co-processor(with eight execution lanes)of Xuantie C906,vector-version CV algorithms averagely exhibit up to 2.98x performances speedups compared with their scalar counterparts.
In SP ARQL federated query system, cardinality estimation is one of the most critical steps that affect query performance. In recent years, a large number of federated query cardinality estimation methods have been pr...
详细信息
Unlike their success in solving complex and difficult problems, there is a lack of proper mathematical analysis and discussion of metaheuristic algorithms. Even though some researches are done on these aspects, the ga...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the generated counterfeit facial images have become increasingly challenging to distinguish. There is an urgent need for a more robust and convincing detection method. Current detection methods mainly operate in the spatial domain and transform the spatial domain into other domains for analysis. With the emergence of transformers, some researchers have also combined traditional convolutional networks with transformers for detection. This paper explores the artifacts left by Deepfakes in various domains and, based on this exploration, proposes a detection method that utilizes the steganalysis rich model to extract high-frequency noise to complement spatial features. We have designed two main modules to fully leverage the interaction between these two aspects based on traditional convolutional neural networks. The first is the multi-scale mixed feature attention module, which introduces artifacts from high-frequency noise into spatial textures, thereby enhancing the model's learning of spatial texture features. The second is the multi-scale channel attention module, which reduces the impact of background noise by weighting the features. Our proposed method was experimentally evaluated on mainstream datasets, and a significant amount of experimental results demonstrate the effectiveness of our approach in detecting Deepfake forged faces, outperforming the majority of existing methods.
In recent years, China has introduced numerous policies aimed at fostering the growth of the traditional Chinese medicine (TCM) industry. Concurrently, the enrichment of TCM healthcare resources has s purred an increa...
详细信息
ISBN:
(数字)9798350363609
ISBN:
(纸本)9798350363616
In recent years, China has introduced numerous policies aimed at fostering the growth of the traditional Chinese medicine (TCM) industry. Concurrently, the enrichment of TCM healthcare resources has s purred an increase in demand for TCM services. To address the needs of TCM practitioners and to offer the public more high-quality, precise, and intelligent TCM services, we have designed a comprehensive WeChat applet for TCM services that incorporates text recognition technology. This applet leverages text recognition to analyze the ingredients listed in prescriptions and employs a cold extraction method to prepare Chinese patent medicines, thereby reducing the cost of TCM treatments for consumers. Developed using the WeChat developer tool, the applet boasts a user-friendly interface and a suite of integrated functionalities, presenting a valuable service model for the TCM sector.
暂无评论