Federated Learning (FL) has significant potential to protect data privacy and mitigate network burden in mobile edge computing (MEC) networks. However, due to the system and data heterogeneity of mobile clients (MCs),...
详细信息
In dynamic meteorological prediction, accurate rainfall forecasting is a mystery. In a complex and dynamic natural environment with unpredictable sky movements, we propose an innovative methodology that forecasts week...
详细信息
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security *** such types of applications based on wireless mobile sensor network ...
详细信息
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security *** such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster *** would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base *** this leads to a serious security breach and degrades the performance of any security protocol available in this *** existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster *** increase communication cost and delay in such real time access *** handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy *** this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base *** proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login *** presented scheme supports scalability for an increasing number of nodes using *** proposed scheme increases the life-time of the network by decreasing the key pool size.
A common approach to explaining NLP models is to use importance measures that express which tokens are important for a prediction. Unfortunately, such explanations are often wrong despite being persuasive. Therefore, ...
A common approach to explaining NLP models is to use importance measures that express which tokens are important for a prediction. Unfortunately, such explanations are often wrong despite being persuasive. Therefore, it is essential to measure their faithfulness. One such metric is if tokens are truly important, then masking them should result in worse model performance. However, token masking introduces out-of-distribution issues, and existing solutions that address this are computationally expensive and employ proxy models. Furthermore, other metrics are very limited in scope. This work proposes an inherently faithfulness measurable model that addresses these challenges. This is achieved using a novel fine-tuning method that incorporates masking, such that masking tokens become in-distribution by design. This differs from existing approaches, which are completely model-agnostic but are inapplicable in practice. We demonstrate the generality of our approach by applying it to 16 different datasets and validate it using statistical in-distribution tests. The faithfulness is then measured with 9 different importance measures. Because masking is in-distribution, importance measures that themselves use masking become consistently more faithful. Additionally, because the model makes faithfulness cheap to measure, we can optimize explanations towards maximal faithfulness;thus, our model becomes indirectly inherently explainable. Copyright 2024 by the author(s)
Good power quality and high-power efficiency are important aspects of power system management. Harmonic, as an unwanted frequency component in electrical signals, can interfere with power quality and reduce electrical...
详细信息
Recently, a lot of research on the movie recommendation system has been conducted. The most important element in the movie recommendation system is to recommend the most suitable movie for an individual. To increase t...
详细信息
We proposed a practical approach with position-based dynamics (PBD) to simulate the volume of a deformable body. A variety of materials were simulated using the general constraints of PBD such as stretch, bending, and...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive ***,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied *** addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.
The demand for high-quality datasets is rapidly increasing across sectors such as healthcare, finance, and cybersecurity, yet challenges like data scarcity and privacy concerns persist. To address this, we introduce a...
详细信息
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w...
详细信息
暂无评论