Load Forecast (LF) is an important task in the planning, control and application of public power systems. Accurate Short Term Load Forecast (STLF) is the premise of safe and economical operation of a power system. In ...
详细信息
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained ...
详细信息
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained attention due to their ability to leverage diverse feature sets from encrypted traffic,improving classification ***,existing research predominantly relies on late fusion techniques,which hinder the full utilization of deep features within the *** address this limitation,we propose a novel multimodal encrypted traffic classification model that synchronizes modality fusion with multiscale feature ***,our approach performs real-time fusion of modalities at each stage of feature extraction,enhancing feature representation at each level and preserving inter-level correlations for more effective *** continuous fusion strategy improves the model’s ability to detect subtle variations in encrypted traffic,while boosting its robustness and adaptability to evolving network *** results on two real-world encrypted traffic datasets demonstrate that our method achieves a classification accuracy of 98.23% and 97.63%,outperforming existing multimodal learning-based methods.
Delineation of retinal vessels in fundus images is essential for detecting a range of eye disorders. An automated technique for vessel segmentation can assist clinicians and enhance the efficiency of the diagnostic pr...
详细信息
Cloud computing has drastically changed the delivery and consumption of live streaming *** designs,challenges,and possible uses of cloud computing for live streaming are studied.A comprehensive overview of the technic...
详细信息
Cloud computing has drastically changed the delivery and consumption of live streaming *** designs,challenges,and possible uses of cloud computing for live streaming are studied.A comprehensive overview of the technical and business issues surrounding cloudbased live streaming is provided,including the benefits of cloud computing,the various live streaming architectures,and the challenges that live streaming service providers face in delivering high‐quality,real‐time *** different techniques used to improve the performance of video streaming,such as adaptive bit‐rate streaming,multicast distribution,and edge computing are discussed and the necessity of low‐latency and high‐quality video transmission in cloud‐based live streaming is *** such as improving user experience and live streaming service performance using cutting‐edge technology,like artificial intelligence and machine learning are *** addition,the legal and regulatory implications of cloud‐based live streaming,including issues with network neutrality,data privacy,and content moderation are *** future of cloud computing for live streaming is examined in the section that follows,and it looks at the most likely new developments in terms of trends and *** technology vendors,live streaming service providers,and regulators,the findings have major policy‐relevant *** on how stakeholders should address these concerns and take advantage of the potential presented by this rapidly evolving sector,as well as insights into the key challenges and opportunities associated with cloud‐based live streaming are provided.
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate ...
详细信息
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate detection capability,but their detection computational efficiency is *** recent years,with the increasing application of deep learning in ocean feature detection,many deep learning-based eddy detection models have been developed for more effective eddy detection from ocean *** it is difficult for them to precisely fit some physical features implicit in traditional methods,leading to inaccurate identification of ocean *** this study,to address the low efficiency of traditional physical methods and the low detection accuracy of deep learning models,we propose a solution that combines the target detection model Faster Region with CNN feature(Faster R-CNN)with the traditional dynamic algorithm Angular Momentum Eddy Detection and Tracking Algorithm(AMEDA).We use Faster R-CNN to detect and generate bounding boxes for eddies,allowing AMEDA to detect the eddy center within these bounding boxes,thus reducing the complexity of center *** demonstrate the detection efficiency and accuracy of this model,this paper compares the experimental results with AMEDA and the deep learning-based eddy detection method *** results show that the eddy detection results of this paper are more accurate than eddyNet and have higher execution efficiency than AMEDA.
This study examines how Chinese older adults leverage Douyin, a short video platform, for informal learning purposes, analyzing their usage patterns, motivations, and encountered challenges. Although Douyin was not ex...
详细信息
In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common *** this paper,we propose a prioritized random access scheme based on comput...
详细信息
In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common *** this paper,we propose a prioritized random access scheme based on compute-and-forward,referred to as expanding window sign-compute diversity slotted ALOHA(EW-SCDSA).We improve the expanding window technique and apply it to a high-throughput random access scheme,i.e.,the signcompute diversity slotted ALOHA(SCDSA)scheme,to implement prioritized random *** analyze the probability of user resolution in each priority class utilizing a bipartite graph and derive the corresponding lower bounds,the effectiveness of which is validated through simulation *** results demonstrate that the EW-SCDSA scheme can provide heterogeneous reliability performance for various user priority classes and significantly outperforms the existing advanced prioritized random access scheme.
Mobile technology is being increasingly adopted in teleconsultation for its convenience and mobility. Although widely accepted by physicians for informal online consultations, the effectiveness of mobile platforms in ...
详细信息
In recent years, with the increasingly severe traffic environment, most cities are facing various traffic congestion problems, and the demand for intelligent regulation of traffic signals is also increasing. In this s...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
暂无评论