In the ever changing environment of education, the skills learned and applied in computer and data science (CADS) have expanded beyond the reach of siloed, single-subject teaching in the classroom. The need for interd...
详细信息
It is common to encounter missing values in database tables. For an incomplete table, a possible world can be obtained by replacing any missed value with a value from the attribute (infinite) domain. A possible key (p...
详细信息
Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents and fuel usage, alleviating congestion, shortening travel t...
详细信息
Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to d...
详细信息
Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information *** value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems *** paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information *** this way,it establishes a basic theoretical framework for *** proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court *** proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.
Background: The automated classification of videos through artificial neural networks is addressed in this work. To explore the concepts and measure the results, the data set UCF101 is used, consisting of video clips ...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to technological advancements. In addition, data owners often worry about misuse and unauthorized access to their personal information. To address this, we propose a secure data-sharing framework that uses local differential privacy (LDP) within a permissioned blockchain, enhanced by federated learning (FL) in a zero-trust environment. To further protect sensitive data shared by IoT devices, we use the Interplanetary File System (IPFS) and cryptographic hash functions to create unique digital fingerprints for files. We mainly evaluate our system based on latency, throughput, privacy accuracy, and transaction efficiency, comparing the performance to a benchmark model. The experimental results show that the proposed system outperforms its counterpart in terms of latency, throughput, and transaction efficiency. The proposed model achieved a lower average latency of 4.0 seconds compared to the benchmark model’s 5.3 seconds. In terms of throughput, the proposed model achieved a higher throughput of 10.53 TPS (transactions per second) compared to the benchmark model’s 8 TPS. Furthermore, the proposed system achieves 85% accuracy, whereas the counterpart achieves only 49%. IEEE
Iris recognition is a secure biometric technology known for its stability and privacy. With no two irises being identical and little change throughout a person’s lifetime, iris recognition is considered more reliable...
详细信息
Visual object tracking is a hot topic in recent *** the meanwhile,Siamese networks have attracted extensive attention in this field because of its balanced precision and ***,most of the Siamese network methods can onl...
详细信息
Visual object tracking is a hot topic in recent *** the meanwhile,Siamese networks have attracted extensive attention in this field because of its balanced precision and ***,most of the Siamese network methods can only distinguish foreground from the non-semantic *** fine-tuning and retraining of fully-convolutional Siamese networks for object tracking(SiamFC)can achieve higher precision under interferences,but the tracking accuracy is still not ideal,especially in the environment with more target interferences,dim light,and *** this paper,we propose crisscross attentional Siamese networks for object tracking(SiamCC).To solve the imbalance between foreground and non-semantic background,we use the feature enhancement module of criss-cross attention to greatly improve the accuracy of video object tracking in dim light and shadow *** results show that the maximum running speed of SiamCC in the object tracking benchmark dataset is 90 frames/*** terms of detection accuracy,the accuracy of shadow sequences is greatly improved,especially the accuracy score of sequence HUMAN8 is improved from 0.09 to 0.89 compared with the original SiamFC,and the success rate score is improved from 0.07 to 0.55.
Global visual localization is critical for UAVs operating in environments where global navigation satellite systems (GNSS) are unreliable or unavailable. While many methods, such as visual odometry (VIO), rely on opti...
详细信息
In social networks groups play a crucial role and making decisions based on majority consensus. Which influencer nodes should we select if our goal is to broadcast a subject in a target group and increase the number o...
详细信息
暂无评论