Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual...
详细信息
Oral cancer diagnosis at earlier stage is very crucial to decide the treatment procedure and to avoid mortality due to this malignant disease. Histopathological imaging is one among modalities widely used by the clini...
详细信息
Biomedical health monitoring systems are evolving rapidly and using non-invasive and cost effective sensors. These systems can monitor physiological parameters of the body to monitor health conditions and provide feed...
详细信息
Ensemble object detectors have demonstrated remarkable effectiveness in enhancing prediction accuracy and uncertainty quantification. However, their widespread adoption is hindered by significant computational and sto...
详细信息
Enforcing smoking bans in public areas remains a challenge due to limitations in conventional monitoring methods. This paper introduces SmokerBeacon, an innovative system for real-time detection of smoking activities ...
详细信息
This paper proposes a YOLOv5s deep learning algorithm incorporating the SE attention mechanism to address the issue of workers failing to wear reflective clothing on duty, which has resulted in casualties from time to...
详细信息
Knowledge graph(KG)serves as a specialized semantic network that encapsulates intricate relationships among real-world entities within a structured *** framework facilitates a transformation in information retrieval,t...
详细信息
Knowledge graph(KG)serves as a specialized semantic network that encapsulates intricate relationships among real-world entities within a structured *** framework facilitates a transformation in information retrieval,transitioning it from mere string matching to far more sophisticated entity *** this transformative process,the advancement of artificial intelligence and intelligent information services is ***,the role ofmachine learningmethod in the construction of KG is important,and these techniques have already achieved initial *** article embarks on a comprehensive journey through the last strides in the field of KG via machine *** a profound amalgamation of cutting-edge research in machine learning,this article undertakes a systematical exploration of KG construction methods in three distinct phases:entity learning,ontology learning,and knowledge ***,a meticulous dissection of machine learningdriven algorithms is conducted,spotlighting their contributions to critical facets such as entity extraction,relation extraction,entity linking,and link ***,this article also provides an analysis of the unresolved challenges and emerging trajectories that beckon within the expansive application of machine learning-fueled,large-scale KG construction.
Yoga is a centuries-old style of exercise followed by sports personnel, patients, and physiotherapist as their regime. A correct posture and technique are the key points in yoga to reap the maximum benefits. Hence, de...
详细信息
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind...
详细信息
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and *** addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation *** on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology *** the node mapping process,three properties of the node are used to measure its mapping ***,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link ***,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource *** former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision *** results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenu
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device ***,at present,a reliable and dynamic access control management system for IIoT is in urgent *** till now,numerous access control architectures have been proposed for ***,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be *** this paper,we offer a smart contract token-based solution for decentralized access control in IIoT ***,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT *** also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration ***,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local ***,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
暂无评论