There are mainly two problems with traditional k-shell centrality in complex networks. First, the traditional k-shell centrality divides many nodes into the same shell layer, which cannot accurately distinguish the pr...
详细信息
There is a growing interest in using spatio-temporal graph networks to predict sea surface temperature (SST). Nevertheless, numerous existing methodologies struggle to accurately capture both local and global spatial ...
详细信息
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false...
详细信息
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks...
详细信息
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a...
详细信息
There is a high-risk privacy issue related to the Internet of Medical Things (IoMT) because of a lack of security in critical and sensitive information. We propose a framework for securing medical data in Healthcare 5...
详细信息
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the...
详细信息
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the constraint of a reconfigurable array,the LSLGM algorithm schedules node from a ready queue to the current reconfigurable cell array *** mapping a node,its successor’s indegree value will be dynamically *** its successor’s indegree is zero,it will be directly scheduled to the ready queue;otherwise,the predecessor must be dynamically *** the predecessor cannot be mapped,it will be scheduled to a blocking *** dynamically adjust the ready node scheduling order,the scheduling function is constructed by exploiting factors,such as node number,node level,and node *** with the loop subgraph-level mapping algorithm,experimental results show that the total cycles of the LSLGM algorithm decreases by an average of 33.0%(PEA44)and 33.9%(PEA_(7×7)).Compared with the epimorphism map algorithm,the total cycles of the LSLGM algorithm decrease by an average of 38.1%(PEA_(4×4))and 39.0%(PEA_(7×7)).The feasibility of LSLGM is verified.
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
作者:
Bo MaJinsong WuWei Qi YanSchool of Engineering
Computer and Mathematical SciencesAuckland University of TechnologyAuckland 1024New Zealand School of Artificial Intelligence
Guilin University of Electronic TechnologyGuilin 540004Chinaand also with the Department of Electrical EngineeringUniversity of ChileSantiago 8010037Chile
Video understanding and content boundary detection are vital stages in video ***,previous content boundary detection methods require collecting information,including location,cast,action,and audio,and if any of these ...
详细信息
Video understanding and content boundary detection are vital stages in video ***,previous content boundary detection methods require collecting information,including location,cast,action,and audio,and if any of these elements are missing,the results may be adversely *** address this issue and effectively detect transitions in video content,in this paper,we introduce a video classification and boundary detection method named *** focus of this paper is on objects in videos along with their labels,enabling automatic scene detection in video clips and establishing semantic connections among local objects in the *** a significant contribution,JudPriNet presents a framework that maps labels to“Continuous Bag of Visual Words Model”to cluster labels and generates new standardized labels as video-type *** facilitates automatic classification of video ***,JudPriNet employs Monte Carlo sampling method to classify video clips,the features of video clips as elements within the *** proposed method seamlessly integrates video and textual components without compromising training and inference *** experimentation,we have demonstrated that JudPriNet,with its semantic connections,is able to effectively classify videos alongside textual *** results indicate that,compared with several other detection approaches,JudPriNet excels in high-level content detection without disrupting the integrity of the video content,outperforming existing methods.
Theα-universal triple I(α-UTI)method is a recognized scheme in the field of fuzzy reasoning,whichwas proposed by our research group *** robustness of fuzzy reasoning determines the quality of reasoning algorithms to...
详细信息
Theα-universal triple I(α-UTI)method is a recognized scheme in the field of fuzzy reasoning,whichwas proposed by our research group *** robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent,which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without ***,in this study,the interval robustness(embodied as the interval stability)of theα-UTI method is explored in the interval-valued fuzzy *** begin with,the stability of theα-UTI method is explored for the case of an individual rule,and the upper and lower bounds of its results are estimated,using four kinds of unified interval implications(including the R-interval implication,the S-interval implication,the QL-interval implication and the interval t-norm implication).Through analysis,it is found that theα-UTI method exhibits good interval stability for an individual ***,the stability of theα-UTI method is revealed in the case of multiple rules,and the upper and lower bounds of its outcomes are *** results show that theα-UTI method is stable for multiple rules when four kinds of unified interval implications are used,***,theα-UTI reasoning chain method is presented,which contains a chain structure with multiple *** corresponding solutions and their interval perturbations are *** is found that theα-UTI reasoning chain method is stable in the case of chain *** application examples in affective computing are given to verify the stability of theα-*** summary,through theoretical proof and example verification,it is found that theα-UTImethod has good interval robustness with four kinds of unified interval implications aiming at the situations of an individual rule,multi-rule and reasoning chain.
暂无评论