In recent years, the utilization of unmanned aerial vehicles (UAVs) for aerial target detection has gained significant attention due to their high-altitude perspective and maneuverability, which offer novel opportunit...
详细信息
Network embedding aspires to learn a low-dimensional vector of each node in networks,which can apply to diverse data mining *** real-life,many networks include rich attributes and temporal ***,most existing embedding ...
详细信息
Network embedding aspires to learn a low-dimensional vector of each node in networks,which can apply to diverse data mining *** real-life,many networks include rich attributes and temporal ***,most existing embedding approaches ignore either temporal information or network attributes.A self-attention based architecture using higher-order weights and node attributes for both static and temporal attributed network embedding is presented in this article.A random walk sampling algorithm based on higher-order weights and node attributes to capture network topological features is *** static attributed networks,the algorithm incorporates first-order to k-order weights,and node attribute similarities into one weighted graph to preserve topological features of *** temporal attribute networks,the algorithm incorporates previous snapshots of networks containing first-order to k-order weights,and nodes attribute similarities into one weighted *** addition,the algorithm utilises a damping factor to ensure that the more recent snapshots allocate a greater *** features are then incorporated into topological ***,the authors adopt the most advanced architecture,Self-Attention Networks,to learn node *** results on node classification of static attributed networks and link prediction of temporal attributed networks reveal that our proposed approach is competitive against diverse state-of-the-art baseline approaches.
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherin...
详细信息
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of *** urges a reliable,flexible,transparent,secure,and cost-effective voting *** proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting *** smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain ***,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or ***,the overall performance of the proposed system is significantly better than that of the existing *** performance was analyzed based on authentication delay,vote alteration,response time,and latency.
This paper explores the impact of source data compression on the performance of task execution at the receiver side of a communication system, and investigates the interference and impact of channel environment variat...
详细信息
Underwater target detection is an important part of marine exploration. However, in complex underwater environments due to factors like light absorption and scattering, as well as variations in water quality and clari...
详细信息
Steel, being a widely utilized material in industrial production, holds a pivotal role in ensuring product safety and longevity. Hence, the exploration and implementation of steel surface defect detection technology c...
详细信息
In the realm of discrete-time modeling for gene regulatory networks, significant focus has been placed on addressing the time lags inherent in the process of DNA transcription to RNA and the subsequent translation of ...
详细信息
In recent years, remote sensing object detection has become a research hotspot in computer vision tasks. However, previous approaches for remote sensing object detection often overlook the rich contextual information ...
详细信息
As deep learning advances, neural network technologies are increasingly penetrating the field of steel surface defect detection. To tackle the challenges of low accuracy and inadequate quality, we introduce CMS-YOLOv8...
详细信息
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).I...
详细信息
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure *** paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure *** constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse *** the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are *** is evaluated,and the data results demonstrate that SCD achieves the above objectives.
暂无评论