The price of passengers is closely related to the travel cost of passengers and the revenue of driverless shared bus. Therefore, the design of pricing mechanism is important to improve the market efficiency of driverl...
详细信息
Insomnia,whether situational or chronic,affects over a third of the general population in today’s ***,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrec...
详细信息
Insomnia,whether situational or chronic,affects over a third of the general population in today’s ***,given the lack of non-contact and non-inductive quantitative evaluation approaches,most insomniacs are often unrecognized and *** Polysomnographic(PSG)is considered as one of the assessment methods,it is poorly tolerated and *** this paper,with the recent development of Internet-of-Things devices and edge computing techniques,we propose a detrended fractal dimension(DFD)feature for the analysis of heart-rate signals,which can be easily acquired by many wearables,of good sleepers and *** feature was derived by calculating the fractal dimension(FD)of detrended *** the trend component removal,we improved the null space pursuit algorithm and proposed an adaptive trend extraction *** experimental results demonstrated the efficacy of the proposed DFD index through numerical statistics and significance testing for healthy and insomnia groups,which renders it a potential biomarker for insomnia assessment and management.
The rapid advancement of high-throughput sequencing technologies and the explosive growth of biological data have revolutionized the field of bioinformatics and biomedical computing[1-4].The generation of vast amounts...
详细信息
The rapid advancement of high-throughput sequencing technologies and the explosive growth of biological data have revolutionized the field of bioinformatics and biomedical computing[1-4].The generation of vast amounts of genomic,transcriptomic,proteomic,and metabolomic data has created unprecedented opportunities for understanding the complexities of biological systems and their implications for human health[5-6].Moreover,the emergence of spatial omics technologies,such as spatial transcriptomics and spatial proteomics,has added a new dimension to our understanding of the spatial organization and heterogeneity of biological *** cutting-edge technologies enable the mapping of molecular information at a high spatial resolution,providing valuable insights into the tissue microenvironment and the interplay between cells in various physiological and pathological conditions[7-10].
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
Cloud services have attracted extensive attention due to low cost, agility and mobility. However, when processing data on cloud servers, users may worry about semi-honest third parties stealing private information fro...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. Lic...
详细信息
In the early days, it was difficult to study bio-electric signals, but now a days these problems have been solved by many hardware devices which are available at low cost. Even then there is a need for technical impro...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sen...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sensing and ***,the collision avoidance performance of CAVs with unexpected obstacles has not been studied in the existing *** this paper,we first design a platoon-based collision avoidance framework for *** this framework,we deploy a Digital Twin(DT)system at the head vehicle in a platoon to reduce communication overhead and decision-making delay based on a proposed trajectory planning *** addition,a DT-assistant system is deployed on the assistant vehicle to monitor vehicles out of the sensing range of the head vehicle for the maintenance of the DT *** this case,the transmission frequency of kinetic states of platoon members can be reduced to ensure low-overhead ***,we design a variable resource reservation interval that can ensure DT synchronization between DT and the assistant system with high *** further improve road safety,an urgency level-based trajectory planning algorithm is proposed to avoid unexpected obstacles considering different levels of emergency *** results show that our DT system-based scheme can achieve significant performance gains in unexpected obstacle *** to the existing schemes,it can reduce collisions by 95%and is faster by about 10%passing by the unexpected obstacle.
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment. The process of achiev...
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment. The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment. Moreover, the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS) without impacting the Service Level Agreements(SLAs). However, the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements. In this paper, Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS) is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud *** CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud. Then, it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources. It further used CBBM for potential Virtual Machine(VM) deployment that attributes towards the provision of optimal resources. It is proposed with the capability of achieving optimal Qo S with minimized time,energy consumption, SLA cost and SLA *** experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21% and reduced SLA violation rate of 18.74%, better than the compared autonomic cloud resource managing frameworks.
暂无评论