Functional encryption(FE)[1,2]is a modern type of encryption scheme that extends several previous notions and allows tremendous flexibility in controlling and computing on encrypted *** enables an authority to derive ...
详细信息
Functional encryption(FE)[1,2]is a modern type of encryption scheme that extends several previous notions and allows tremendous flexibility in controlling and computing on encrypted *** enables an authority to derive constrained decryp-
Security and secure routing are important design issues in the design of Wireless Sensor Networks (WSNs). Intrusion Detection systems (IDSs) are useful for securing the communication in WSNs. An IDS can be developed b...
详细信息
Service-Oriented Architecture (SOA) constructs applications by publishing services in an open network environment. In network environment individual service changes highly dynamically, it is required the system based ...
详细信息
In this paper, we focus on analyzing the behavior of the selection models for real-coded genetic algorithms. Recent studies show that Just Generation Gap (JGG) selection model outperforms Minimal Generation Gap (MGG) ...
详细信息
In this paper, we focus on analyzing the behavior of the selection models for real-coded genetic algorithms. Recent studies show that Just Generation Gap (JGG) selection model outperforms Minimal Generation Gap (MGG) model when a multi-parental crossover operator based on the hypothesis of the preservation of the statistics of parents is used. However, the validation of JGG selection model is not done yet. To validate the selection method of JGG, we analyze the differences of the behavior of JGG selection model and that of MGG selection model.
In this paper, we present a fuzzy logic based scheme for a two hop energy harvesting(EH)wireless sensor network(WSN). Incorporating data and energy causality constraints, discrete transmission rates, finite energy and...
详细信息
In this paper, we present a fuzzy logic based scheme for a two hop energy harvesting(EH)wireless sensor network(WSN). Incorporating data and energy causality constraints, discrete transmission rates, finite energy and data buffers, a fuzzy model is developed which uses network throughput, battery level and channel gain as inputs. The fuzzy scheme is then compared with optimum, modified optimum, and Markov decision process(MDP) schemes in terms of computational complexity, throughput, battery level and data buffer capacity. The throughput results show that the fuzzy online scheme preforms closely to the compared schemes and avoids battery depletion even when the number of discrete transmission rates are increased.
By means of introducing multi-auctioneer model, resources in the computational economic grid can be managed and allocated like in the auction. We research and put forward the corresponding solve schemes of three key i...
详细信息
ISBN:
(纸本)9780889866386
By means of introducing multi-auctioneer model, resources in the computational economic grid can be managed and allocated like in the auction. We research and put forward the corresponding solve schemes of three key issues of auctioneer system: preventing auctioneer from cheating, selection of auctioneer, setting of trading prices, and use computational grid modeling and simulation tools GridSim to simulate computational grid environment in the experiment which uses multiauctioneer system to manage and schedule, then we analyze the results of experiment in different conditions, and validate the feasibility of a multi-auctioneer system in computational grid.
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of informati...
详细信息
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour *** applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data *** single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident *** data analysis did not support threat severity relationship with conscious care *** findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.
Empathy detection (ED) and empathy intent classification (EIC) aim to identify the empathy direction expressed in user utterances and the underlying empathy intent behind them. Previous studies show that facilitating ...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Empathy detection (ED) and empathy intent classification (EIC) aim to identify the empathy direction expressed in user utterances and the underlying empathy intent behind them. Previous studies show that facilitating information transfer between tasks can enhance model performance. However, the interaction between ED and EIC in few-shot learning remains underexplored. To this end, we identify the challenges in jointly training ED and EIC in a few-shot setting: establishing effective information transfer between them and improving the model’s generalization capability. We propose a novel model called USB. For information transfer, the interactive module maps empathy and empathy intent labels through utterances to model task correlations. For generalization capability, after capturing empathy and empathy intent representations with an adaptive fusion module, we introduce a multi-level contrastive learning strategy to optimize representations at task and label levels, enhancing generalization. Experimental results on two public datasets show that our model outperforms all baselines.
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply ***,their widespread use also poses significant challenges,such as publi...
详细信息
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply ***,their widespread use also poses significant challenges,such as public safety,privacy,and ***,targetingUAVs have become more frequent,which highlights the need for robust security *** technology,the foundation of cryptocurrencies has the potential to address these *** study suggests a platform that utilizes blockchain technology tomanage drone operations securely and *** incorporating blockchain technology,the proposed method aims to increase the security and privacy of drone *** suggested platform stores information on a public blockchain located on Ethereum and leverages the Ganache platform to ensure secure and private blockchain *** wallet for Ethbalance is necessary for BCT *** present research finding shows that the proposed approach’s efficiency and security features are superior to existing *** study contributes to the development of a secure and efficient system for managing drone operations that could have significant applications in various *** proposed platform’s security measures could mitigate privacy concerns,minimize cyber security risk,and enhance public safety,ultimately promoting the widespread adoption of *** results of the study demonstrate that the blockchain can ensure the fulfillment of core security needs such as authentication,privacy preservation,confidentiality,integrity,and access control.
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensu...
详细信息
This paper investigates the differentially private problem of the average consensus for a class of discrete-time multi-agent network systems(MANSs). Based on the MANSs,a new distributed differentially private consensus algorithm(DPCA) is developed. To avoid continuous communication between neighboring agents, a kind of intermittent communication strategy depending on an event-triggered function is established in our DPCA. Based on our algorithm, we carry out the detailed analysis including its convergence, its accuracy, its privacy and the trade-off between the accuracy and the privacy level, respectively. It is found that our algorithm preserves the privacy of initial states of all agents in the whole process of consensus computation. The trade-off motivates us to find the best achievable accuracy of our algorithm under the free parameters and the fixed privacy level. Finally, numerical experiment results testify the validity of our theoretical analysis.
暂无评论