The primary objective is to develop a robust system for precise object identification on retail shelves, accurate item counting, and product categorization through class detection. This multifaceted approach directly ...
详细信息
This article introduces a novel approach to data structure visualization through the development of a new programming language, utilizing Python's Lex-YACC library for lexical analysis and parsing, and the Turtle ...
详细信息
One of the primary challenges in cybersecurity is that even one un-detected, appropriately unanalyzed malicious security event can hide the attack vectors of a potential hacker. It is essential to detect the data brea...
详细信息
Blockchain technology has gained significant attention for its ability to provide a decentralized and immutable platform for various applications. In this paper, we propose a Blockchain based Decentralized Case Manage...
详细信息
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually...
详细信息
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually migrate data at a granularity of 4 KB pages,and thus waste memory bandwidth and DRAM *** this paper,we propose Mocha,a non-hierarchical architecture that organizes DRAM and NVM in a flat address space physically,but manages them in a cache/memory *** the commercial NVM device-Intel Optane DC Persistent Memory Modules(DCPMM)actually access the physical media at a granularity of 256 bytes(an Optane block),we manage the DRAM cache at the 256-byte size to adapt to this feature of *** design not only enables fine-grained data migration and management for the DRAM cache,but also avoids write amplification for Intel Optane *** also create an Indirect Address Cache(IAC)in Hybrid Memory Controller(HMC)and propose a reverse address mapping table in the DRAM to speed up address translation and cache ***,we exploit a utility-based caching mechanism to filter cold blocks in the NVM,and further improve the efficiency of the DRAM *** implement Mocha in an architectural *** results show that Mocha can improve application performance by 8.2%on average(up to 24.6%),reduce 6.9%energy consumption and 25.9%data migration traffic on average,compared with a typical hybrid memory architecture-HSCC.
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before...
详细信息
This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs *...
详细信息
This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs *** aim is to de-rive the shortest possible link schedule that determines the transmission time of inter-HAPs links,and uplinks from devices to *** first outline a mixed in-teger linear program(MILP),which can be run by a central node to determine the optimal schedule and transmit power of HAPs and *** then out-line a game theory based protocol called Distributed Schedule Minimization Protocol(DSMP)that is run by HAPs and ***,it does not require causal energy arrivals and channel gains *** results show that DSMP produces schedule lengths that are at most 1.99x longer than the schedule computed by MILP.
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to technological advancements. In addition, data owners often worry about misuse and unauthorized access to their personal information. To address this, we propose a secure data-sharing framework that uses local differential privacy (LDP) within a permissioned blockchain, enhanced by federated learning (FL) in a zero-trust environment. To further protect sensitive data shared by IoT devices, we use the Interplanetary File System (IPFS) and cryptographic hash functions to create unique digital fingerprints for files. We mainly evaluate our system based on latency, throughput, privacy accuracy, and transaction efficiency, comparing the performance to a benchmark model. The experimental results show that the proposed system outperforms its counterpart in terms of latency, throughput, and transaction efficiency. The proposed model achieved a lower average latency of 4.0 seconds compared to the benchmark model’s 5.3 seconds. In terms of throughput, the proposed model achieved a higher throughput of 10.53 TPS (transactions per second) compared to the benchmark model’s 8 TPS. Furthermore, the proposed system achieves 85% accuracy, whereas the counterpart achieves only 49%. IEEE
Human Activity Recognition(HAR)has become a subject of concern and plays an important role in daily *** uses sensor devices to collect user behavior data,obtain human activity information and identify *** Logic Networ...
详细信息
Human Activity Recognition(HAR)has become a subject of concern and plays an important role in daily *** uses sensor devices to collect user behavior data,obtain human activity information and identify *** Logic Networks(MLN)are widely used in HAR as an effective combination of knowledge and *** can solve the problems of complexity and uncertainty,and has good knowledge expression ***,MLN structure learning is relatively weak and requires a lot of computing and storage ***,the MLN structure is derived from sensor data in the current *** that the sensor data can be effectively sliced and the sliced data can be converted into semantic rules,MLN structure can be *** this end,we propose a rulebase building scheme based on probabilistic latent semantic analysis to provide a semantic rulebase for MLN *** a rulebase can reduce the time required for MLN structure *** apply the rulebase building scheme to single-person indoor activity recognition and prove that the scheme can effectively reduce the MLN learning *** addition,we evaluate the parameters of the rulebase building scheme to check its stability.
In the realm of clinical healthcare, medical visual question answering systems emerge as a pivotal innovation that plays a crucial role in clinical decision-making and patient care. They are designed to interpret medi...
详细信息
暂无评论