In recent years, blockchain technology has witnessed rapid development and received considerable attention. However, its decentralized and pseudonymous nature has also attracted many criminal activities. Among them, P...
详细信息
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the ...
详细信息
With the continuous development of deep learning, reid has been continually improved. However, the network backbones of reid are mostly manually designed. This paper proposes RGA-Reid based on auto-reid. NASBR-Reid ob...
详细信息
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor...
详细信息
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing *** cloud is nowadays highly affected by internal threats of the *** applications such as banking,hospital,and business are more likely affected by real user *** intruder is presented as a user and set as a member of the *** becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or *** major issue in today's technological development is identifying the insider threat in the cloud *** data are lost,compromising cloud users is *** and security are not ensured,and then,the usage of the cloud is not *** solutions are available for the external security of the cloud ***,insider or internal threats need to be *** this research work,we focus on a solution for identifying an insider attack using the artificial intelligence *** insider attack is possible by using nodes of weak users’*** will log in using a weak user id,connect to a network,and pretend to be a trusted ***,they can easily attack and hack information as an insider,and identifying them is very *** types of attacks need intelligent solutions.A machine learning approach is widely used for security *** date,the existing lags can classify the attackers *** information hijacking process is very absurd,which motivates young researchers to provide a solution for internal *** our proposed work,we track the attackers using a user interaction behavior pattern and deep learning *** usage of mouse movements and clicks and keystrokes of the real user is stored in a *** deep belief neural
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro...
详细信息
ISBN:
(纸本)9798350383867
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result from this solely formed networks this report offer extensive Dynamic Topology Management (DTM) method. Dynamic routing protocols lager lines, dividend balancing, Life-saving administration, guarantee of reliability, cross-layer design, security aspects and the on-time monitoring and discovery of topology changes are the main objectives and steps to be accomplished. Real-time Location monitoring and forest structure discovery are made possible by employing adaptive routing protocols, namely Dynamic Source Routing(DSR) and Ad-Hoc On-Demand Distance Vector(AODV). Also, the algorithms are capable of making advance adjustments to routing routes and resource allocations drawn from the mobility patterns forecasting which is vital. Load balancing methods, which distribute traffic in a network evenly, enable the system to run efficiently and avoid problems caused by overloading. Algorithms that are energy-efficient and make the best use of energy resources having their topology's optimized are introduced to the streamlined energy distribution systems. These algorithms are focused on the node's energy level. Through fault tolerance techniques which recognize and handle failures in nodes and partitioned networks, connectedness activity is a continuous one. Through QoS perception, the network topology might automatically be tailored to conform to the given quality criteria, thus not restricting the choice for differing applications. The proposed could have defenses against adversary nodes and their potential DDoS attacks which will enhance network protection. Yet another advantage of an architectural style that promotes cross-layer collaboration is enhanced topology management which is the goal around which the functions of various levels of the protocol stack revolve
Magnetic Resonance Imaging (MRI) is crucial for diagnosing various knee-related diseases, and developing automatic diagnostic models based on knee MRI data is highly valuable. However, this task presents significant c...
详细信息
Traditional recommendation algorithms overlook the abundant information present in user feedback and are limited to the binary relationship between items and users. In contrast, this paper proposes an algorithm that t...
详细信息
In order to study the role of the new technological concept of shared experiences in the digital interactive experience of cultural heritage and apply it to the digital interactive experience of cultural heritage to s...
详细信息
In order to study the role of the new technological concept of shared experiences in the digital interactive experience of cultural heritage and apply it to the digital interactive experience of cultural heritage to solve the current problems in this field,starting from the mixed reality(MR) technology that the shared experiences rely on,proper software and hardware platforms were investigated and selected,a universal shared experiences solution was designed,and an experimental project based on the proposed solution was made to verify its *** the end,a proven and workable shared experiences solution was *** solution included a proposed MR spatial alignment method,and it integrated the existing MR content production process and standard network synchronization ***,it is concluded that the introduction and reasonable use of new technologies can help the development of the digital interactive experience of cultural *** shared experiences solution for the digital interactive experience of cultural heritage balances investment issues in the exhibition,display effect,and user *** can speed up the promotion of cultural heritage and bring the vitality of MR technology to relevant projects.
Brain tumors are critical medical conditions that require timely and accurate diagnosis to improve survival outcomes. This research proposes a cutting-edge framework for brain tumor classification, combining fine-tune...
详细信息
In the long history of more than 1 500 years,Dunhuang murals suffered from various deteriorations causing irreversible damage such as falling off,fading,and so ***,the existing Dunhuang mural restoration methods are t...
详细信息
In the long history of more than 1 500 years,Dunhuang murals suffered from various deteriorations causing irreversible damage such as falling off,fading,and so ***,the existing Dunhuang mural restoration methods are time-consuming and not feasible to facilitate cultural dissemination and permanent *** by cultural computing using artificial intelligence,gated-convolution-based dehaze net(GD-Net) was proposed for Dunhuang mural refurbishment and comprehensive ***,a neural network with gated convolution was applied to restore the falling off areas of the mural to ensure the integrity of the mural ***,a dehaze network was applied to enhance image quality to cope with the fading of the ***,a Dunhuang mural dataset was presented to meet the needs of deep learning approach,containing 1 180 images from the Cave 290 and Cave 112 of the Mogao *** experimental results demonstrate the effectiveness and superiority of GD-Net.
暂无评论