This study focuses on the application of process mining in the healthcare sector. Despite its potential to enhance efficiency, reduce costs, and improve patient satisfaction, the selection of process-mining software p...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to technological advancements. In addition, data owners often worry about misuse and unauthorized access to their personal information. To address this, we propose a secure data-sharing framework that uses local differential privacy (LDP) within a permissioned blockchain, enhanced by federated learning (FL) in a zero-trust environment. To further protect sensitive data shared by IoT devices, we use the Interplanetary File System (IPFS) and cryptographic hash functions to create unique digital fingerprints for files. We mainly evaluate our system based on latency, throughput, privacy accuracy, and transaction efficiency, comparing the performance to a benchmark model. The experimental results show that the proposed system outperforms its counterpart in terms of latency, throughput, and transaction efficiency. The proposed model achieved a lower average latency of 4.0 seconds compared to the benchmark model’s 5.3 seconds. In terms of throughput, the proposed model achieved a higher throughput of 10.53 TPS (transactions per second) compared to the benchmark model’s 8 TPS. Furthermore, the proposed system achieves 85% accuracy, whereas the counterpart achieves only 49%. IEEE
This paper considers similarities between statistical physics and Bayes inference through the Bayesian linear regression model. Some similarities have been discussed previously, such as the analogy between the margina...
详细信息
This paper considers similarities between statistical physics and Bayes inference through the Bayesian linear regression model. Some similarities have been discussed previously, such as the analogy between the marginal likelihood in Bayes inference and the partition function in statistical mechanics. In particular, this paper considers the proposal to associate discrete sample size with inverse temperature [C. H. LaMont and P. A. Wiggins, Phys. Rev. E 99, 052140 (2019)]. The previous study suggested that incorporating this similarity motivates the derivation of analogs of thermodynamic functions such as energy and entropy. The study also anticipated that those analogous functions have potential to describe Bayes estimation from physical points of view and to provide physical insights into mechanisms of estimation. This paper incorporates a macroscopic perspective as an asymptotics similar to the thermodynamic limit into the previous suggestion. Its motivation stems from the statistical mechanical concept of deriving thermodynamic functions that characterize macroscopic properties of macroscopic systems. This incorporation not only allows analogs of macroscopic thermodynamic functions to be considered but also suggests a candidate for an analog of inverse temperature with continuity, which is partly consistent with the previous proposal to associate the discrete sample size with inverse temperature. On the basis of this suggestion, we analyze analogs of macroscopic thermodynamic functions for a Bayesian linear regression model which is the basis of various machine learning models. We further investigate, through the behavior of these functions, how Bayes estimation is described from the perspective of physics and what kind of physical insight is obtained. As a result, the estimation of regression coefficients, which is the primary task of regression, appears to be described by the physical picture of balance between decreasing energy and increasing entropy as in equi
Mobile Ad hoc Network (MANET) is broadly applicable in various sectors within a short amount of time, which is connected to mobile developments. However, the communication in the MANET faces several issues like synchr...
详细信息
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident preventi...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic *** these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle *** paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly ***-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by *** systems can autonomously create specific models based on network data to differentiate between regular traffic and *** these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational *** evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and *** review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV *** examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
Skin cancer is the most prevalent cancer globally,primarily due to extensive exposure to Ultraviolet(UV)*** identification of skin cancer enhances the likelihood of effective treatment,as delays may lead to severe tum...
详细信息
Skin cancer is the most prevalent cancer globally,primarily due to extensive exposure to Ultraviolet(UV)*** identification of skin cancer enhances the likelihood of effective treatment,as delays may lead to severe tumor *** study proposes a novel hybrid deep learning strategy to address the complex issue of skin cancer diagnosis,with an architecture that integrates a Vision Transformer,a bespoke convolutional neural network(CNN),and an Xception *** were evaluated using two benchmark datasets,HAM10000 and Skin Cancer *** the HAM10000,the model achieves a precision of 95.46%,an accuracy of 96.74%,a recall of 96.27%,specificity of 96.00%and an F1-Score of 95.86%.It obtains an accuracy of 93.19%,a precision of 93.25%,a recall of 92.80%,a specificity of 92.89%and an F1-Score of 93.19%on the Skin Cancer ISIC *** findings demonstrate that the model that was proposed is robust and trustworthy when it comes to the classification of skin *** addition,the utilization of Explainable AI techniques,such as Grad-CAM visualizations,assists in highlighting the most significant lesion areas that have an impact on the decisions that are made by the model.
This paper proposes two polynomial-time approximation algorithms for allocating servers to design a consistency-aware multi-server network for delay-sensitive applications. Each algorithm selects servers and determine...
详细信息
Human Activity Recognition (HAR) has become a significant area of study in the fields of health, human behavior analysis, the Internet of Things, and human–machine interaction in recent years. Smartphones are a popul...
详细信息
In recent years due to increase in the number of customers and organizations utilize cloud applications for personal and professionalization become greater. As a result of this increase in utilizing the Cloud services...
详细信息
暂无评论