In this paper we consider the problem of training a Support Vector Machine (SVM) online using a stream of data in random order. We provide a fast online training algorithm for general SVM on very large datasets. Based...
详细信息
Phishing attacks, which aim to steal sensitive information by tricking users into fraudulent websites, continue to pose significant financial and operational threats to organizations and individuals. While various stu...
详细信息
Smartphones offer a wide range of applications globally, and usability is a key factor in their quality. Human-computer Interaction (HCI) continuously evolves to enhance usability by improving user interface (UI) comp...
详细信息
MobileNetV2 represents a significant advancement in the design of efficient neural networks for mobile and embedded applications. Its innovative use of inverted residuals, linear bottlenecks, and depthwise separable c...
详细信息
In many IIoT architectures,various devices connect to the edge cloud via gateway *** data processing,numerous data are delivered to the edge *** data to an appropriate edge cloud is critical to improve IIoT service **...
详细信息
In many IIoT architectures,various devices connect to the edge cloud via gateway *** data processing,numerous data are delivered to the edge *** data to an appropriate edge cloud is critical to improve IIoT service *** are two types of costs for this kind of IoT network:a communication cost and a computing *** service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also ***,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing *** proposed method selects an edge cloud that minimizes the total cost of the communication and computing *** is,a device chooses a routing path to the selected edge cloud based on the *** proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing *** performance of the proposed method is validated through extensive computer *** the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
Immersive and simulation technologies, such as Augmented Reality (AR), Virtual Reality (VR), Mixed Reality (MR), and Digital Twins (DTs), have proven effective in enhancing decision-making, streamlining operations, an...
详细信息
Smart metering systems (SMS) are popular in industrial and residential areas but can risk privacy by revealing user behaviors. Homomorphic encryption (HE) is a technique that protects data privacy by enabling calculat...
详细信息
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio...
详细信息
Nowadays, drought is one of the trending topics in the world that has turned into a challenge for the world. By developing countries and cities worldwide, especially in the economic aspect, governments started to dama...
详细信息
The cloud-based devices face many threats these days due to shared resources like power. The attacker measures the power by using some remote sensors which are present in attacker tenants. These sensors get partial or...
详细信息
暂无评论