Live video streaming demands high user Quality of Experience (QoE) and requires significant computing power and bandwidth for video encoding and transmission. The standard adaptive live streaming approach encodes the ...
详细信息
In this paper, we study the performance of wireless-powered cluster-based multi-hop cognitive relay networks (MCRNs), where secondary nodes harvest energy from multiple dedicated power beacons (PBs) and share the spec...
详细信息
Behavior-Driven Development (BDD) user stories are widely used in agile methods for capturing user requirements and acceptance criteria due to their simplicity and clarity. However, the concise structure of BDD-based ...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device ***,at present,a reliable and dynamic access control management system for IIoT is in urgent *** till now,numerous access control architectures have been proposed for ***,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be *** this paper,we offer a smart contract token-based solution for decentralized access control in IIoT ***,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT *** also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration ***,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local ***,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
Action recognition in videos is a critical task in computer vision, with a wide range of applications including security surveillance, behavior analysis, and cooperative control. Despite significant advancements in ac...
详细信息
Group features have significant effects on pedestrian movement and constitute a focal point in pedestrian trajectory prediction research. In reality, pedestrians within a group exhibit notable consistency features due...
详细信息
With the advent of the Web 3.0 era, the amount and types of data in the network have sharply increased, and the application scenarios of recommendation algorithms are continuously expanding. Location recommendation ha...
详细信息
GitHub repository recommendation is a research hotspot in the field of open-source software. The current problemswith the repository recommendation systemare the insufficient utilization of open-source community infor...
详细信息
GitHub repository recommendation is a research hotspot in the field of open-source software. The current problemswith the repository recommendation systemare the insufficient utilization of open-source community informationand the fact that the scoring metrics used to calculate the matching degree between developers and repositoriesare developed manually and rely too much on human experience, leading to poor recommendation results. Toaddress these problems, we design a questionnaire to investigate which repository information developers focus onand propose a graph convolutional network-based repository recommendation system (GCNRec). First, to solveinsufficient information utilization in open-source communities, we construct a Developer-Repository networkusing four types of behavioral data that best reflect developers’ programming preferences and extract features ofdevelopers and repositories from the repository content that developers focus on. Then, we design a repositoryrecommendation model based on a multi-layer graph convolutional network to avoid the manual formulation ofscoringmetrics. Thismodel takes the Developer-Repository network, developer features and repository features asinputs, and recommends the top-k repositories that developers are most likely to be interested in by learning theirpreferences. We have verified the proposed GCNRec on the dataset, and by comparing it with other open-sourcerepository recommendation methods, GCNRec achieves higher precision and hit rate.
Offensive language detection has received important attention and plays a crucial role in promoting healthy communication on social platforms,as well as promoting the safe deployment of large language *** data is the ...
详细信息
Offensive language detection has received important attention and plays a crucial role in promoting healthy communication on social platforms,as well as promoting the safe deployment of large language *** data is the basis for developing detectors;however,the available offense-related dataset in Chinese is severely limited in terms of data scale and coverage when compared to English *** significantly affects the accuracy of Chinese offensive language detectors in practical applications,especially when dealing with hard cases or out-of-domain *** alleviate the limitations posed by available datasets,we introduce AugCOLD(Augmented Chinese Offensive Language Dataset),a large-scale unsupervised dataset containing 1 million samples gathered by data crawling and model ***,we employ a multiteacher distillation framework to enhance detection performance with unsupervised *** is,we build multiple teachers with publicly accessible datasets and use them to assign soft labels to *** soft labels serve as a bridge for knowledge to be distilled from both AugCOLD and multiteacher to the student network,i.e.,the final offensive *** conduct experiments on multiple public test sets and our well-designed hard tests,demonstrating that our proposal can effectively improve the generalization and robustness of the offensive language detector.
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission *** Body Sensor Network(BSN)systems,biosensors communi...
详细信息
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission *** Body Sensor Network(BSN)systems,biosensors communicate with receiving devices through relay nodes to improve their limited energy *** the relay node fails,the biosensor can communicate directly with the receiving device by releasing more transmitting ***,if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device,the biosensor will be isolated by the ***,a new combinatorial analysis method is proposed to analyze the influence of random isolation time(RIT)on system reliability,and the competition relationship between biosensor isolation and propagation failure is *** approach inherits the advantages of common combinatorial algorithms and provides a new approach to effectively address the impact of RIT on system reliability in IoT systems,which are affected by competing ***,the method is applied to the BSN system,and the effect of RIT on the system reliability is analyzed in detail.
暂无评论