Pretrained language models (PLMs) have shown remarkable performance on question answering (QA) tasks, but they usually require fine-tuning (FT) that depends on a substantial quantity of QA pairs. Therefore, improving ...
详细信息
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and *** security systems,such as Intrusion Detection Systems(IDS),are essential ...
详细信息
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and *** security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and *** to their compact nature and low energy reserves,wireless networks present a significant challenge for security *** features of small cells can cause threats to the *** Coding(NC)enabled small cells are vulnerable to various types of *** attacks and performing secure“peer”to“peer”data transmission is a challenging task in small *** to the low power and memory requirements of the proposed model,it is well suited to use with constrained small *** attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared *** this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion *** proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
Logistics supply chain (LSC), a chain structure that integrates and coordinates all logistics transactions, has become an essential component of the modern logistics industry. By using blockchain, trusted logistics se...
详细信息
Diabetic Retinopathy (DR) is a primitive cause of blindness in diabetic patients. There are chances for DR in certain cases, due to the damage in the retinal vascular area. It may lead to blindness or loss of vision i...
详细信息
Substitution ciphers—where characters are systematically replaced with different ones—have represented a vital tool in safeguarding sensitive information for centuries, eventually laying the foundation for modern en...
详细信息
Demand forecasting has emerged as a crucial element in supply chain management. It is essential to identify anomalous data and continuously improve the forecasting model with new data. However, existing literature fai...
详细信息
Retrieval plays an important role in knowledge-based visual question answering (KB-VQA), which relies on external knowledge to answer questions related to an image. However, not all information in the external knowled...
详细信息
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may...
详细信息
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may result in various intrusions and privacy *** a result,this study employs federated learning(FL)using a flower paradigm to preserve each organization’s privacy while collaborating to build a robust shared global ***,diverse data distributions in the collaborative training process might result in inadequate model learning and a lack of *** address this issue,the present paper proposes the imple-mentation of Federated Averaging(FedAvg)and Federated Proximal(FedProx)methods in the flower framework,which take advantage of the data locality while training and guaranteeing global *** improves the privacy of the local *** analysis used the credit card and Canadian Institute for Cybersecurity Intrusion Detection Evaluation(CICIDS)***,recall,and accuracy as performance indicators to show the efficacy of the proposed strategy using FedAvg and *** experimental findings suggest that the proposed approach helps to safely use banking data from diverse sources to enhance customer banking services by obtaining accuracy of 99.55%and 83.72%for FedAvg and 99.57%,and 84.63%for FedProx.
Ikigai, a Japanese term often referred to as "purpose in life" or "the feeling that life is worthwhile", is a commonly used indicator of well-being in studies focused on the elderly population in J...
详细信息
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T...
详细信息
暂无评论