RFID Technology has grown increasingly popular over recent years due to its efficiency. This study examines the development, implementation, and impact of an RFID-based cognitive learning system focusing on child prep...
详细信息
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
This study introduces two novel hybrid machine-learning architectures for multilabel anomaly detection in electrocardiograms (EKGs): a 1D modified ResNet combined with a transformer encoder and an equivalent 2D ResNet...
详细信息
作者:
Liawatimena, SuryadiputraGunawan, DevinaBina Nusantara University
Automotive & Robotics Program Computer Engineering Department BINUS ASO School of Engineering Computer Science Deparment BINUS Graduate Program Master of Computer Science Jakarta11480 Indonesia Bina Nusantara University
Automotive & Robotics Program Computer Engineering Department BINUS ASO School of Engineering Jakarta11480 Indonesia
Modern retail businesses face a significant challenge with the inefficiency of manually changing price labels on shelves. This manual process not only consumes valuable time and resources but also increases the likeli...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
The aim of this paper is to provide an advanced WSN solution for power-sustainable energy management and efficient communication, integrating the latest developments from the SEMS. This work will focus on the research...
详细信息
Lauded as the world's most popular fruit, bananas are one of the main exports of the Philippines. It contains essential nutrients that can have a protective impact on health. Commonly, farmers can distinguish the ...
详细信息
Mobile edge computing(MEC) provides edge services to users in a distributed and on-demand *** to the heterogeneity of edge applications, deploying latency and resource-intensive applications on resourceconstrained dev...
详细信息
Mobile edge computing(MEC) provides edge services to users in a distributed and on-demand *** to the heterogeneity of edge applications, deploying latency and resource-intensive applications on resourceconstrained devices is a key challenge for service providers. This is especially true when underlying edge infrastructures are fault and error-prone. In this paper, we propose a fault tolerance approach named DFGP, for enforcing mobile service fault-tolerance in MEC. It synthesizes a generative optimization network(GON) model for predicting resource failure and a deep deterministic policy gradient(DDPG) model for yielding preemptive migration *** show through extensive simulation experiments that DFGP is more effective in fault detection and guaranteeing quality of service, in terms of fault detection accuracy, migration efficiency, task migration time, task scheduling time,and energy consumption than other existing methods.
The traditional plasma etching process for defining micro-LED pixels could lead to significant sidewall *** near sidewall regions act as non-radiative recombination centers and paths for current leakage,significantly ...
详细信息
The traditional plasma etching process for defining micro-LED pixels could lead to significant sidewall *** near sidewall regions act as non-radiative recombination centers and paths for current leakage,significantly deteriorating device *** this study,we demonstrated a novel selective thermal oxidation(STO)method that allowed pixel definition without undergoing plasma damage and subsequent dielectric *** annealing in ambient air oxidized and reshaped the LED structure,such as p-layers and InGaN/GaN multiple quantum ***,the pixel areas beneath the pre-deposited SiO_(2)layer were selectively and effectively *** was demonstrated that prolonged thermal annealing time enhanced the insulating properties of the oxide,significantly reducing LED leakage ***,applying a thicker SiO_(2)protective layer minimized device resistance and boosted device efficiency *** the STO method,InGaN green micro-LED arrays with 50-,30-,and 10-μm pixel sizes were manufactured and *** results indicated that after 4 h of air annealing and with a 3.5-μm SiO_(2)protective layer,the 10-μm pixel array exhibited leakage currents density 1.2×10^(-6)A/cm^(2)at-10 V voltage and a peak on-wafer external quantum efficiency of~6.48%.This work suggests that the STO method could become an effective approach for future micro-LED manufacturing to mitigate adverse LED efficiency size effects due to the plasma etching and improve device ***-LEDs fabricated through the STO method can be applied to micro-displays,visible light communication,and optical interconnect-based *** planar pixel geometry will provide more possibilities for the monolithic integration of driving circuits with ***,the STO method is not limited to micro-LED fabrication and can be extended to design other III-nitride devices,such as photodetectors,laser diodes,high-electron-mobility transistors
暂无评论