In light of future work challenges, true human resource management (HRM) must be rebuilt. This involves over time human resource development;it must also contain the concept of sustainability to move from consuming to...
详细信息
作者:
Ain, Qurat UlRana, TauseefAamana
Department of Computer Science Islamabad Pakistan NUST
Military College of Signals Department of Computer Software Engineering Islamabad Pakistan
Department of Software Engineering Rawalpindi Pakistan
To assess the quality, acceptability and user experience of interactive applications, usability is one of the most integral quality attributes. However, significant number of usability bugs are being experienced by th...
详细信息
In this paper, we describe our approach to CLEF 2024 Lab 2 CheckThat! Task 1 (Check-worthiness) and Task 2 (Subjectivity), which aims to evaluate how consistent Large Language Models (LLMs) can distinguish between obj...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twi...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twin(DT)*** widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical *** create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT *** high volume of user data and the ubiquitous communication systems in DTNs come with their own set of *** most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data ***,currently,there is not enough literature that focuses on privacy and security issues in DTN *** this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their ***,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective *** then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the *** also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the ***,we provide some open research issues and problems in the field of DTN privacy and security.
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avo...
详细信息
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avoid ***,optimal path selection to route traffic between the origin and destination is *** research proposed a realistic strategy to reduce traffic management service response time by enabling real-time content distribution in IoV systems using heterogeneous network ***,this work proposed a novel use of the Ant Colony Optimization(ACO)algorithm and formulated the path planning optimization problem as an Integer Linear Program(ILP).This integrates the future estimation metric to predict the future arrivals of the vehicles,searching the optimal *** the mobile nature of IOV,fuzzy logic is used for congestion level estimation along with the ACO to determine the optimal *** model results indicate that the suggested scheme outperforms the existing state-of-the-art methods by identifying the shortest and most cost-effective ***,this work strongly supports its use in applications having stringent Quality of Service(QoS)requirements for the vehicles.
This paper proposes a classification model for single label implicit discourse relation recognition trained on soft-label distributions. It follows the PDTB 3.0 framework and it was trained and tested on the DiscoGeM ...
详细信息
Pneumonia is an inflammatory lung disease that mostly affects the tiny air sacs known as alveoli in human bodies. Pneumonia may be caused by bacteria, viruses, or fungi. Mild to severe symptoms may include a mucus-pro...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
Interactive communication media algorithms are useful tools for creating efficient and effective networking applications. Such algorithms enable the application to accurately predict user behaviour and preferences, us...
详细信息
This paper introduces a unified framework for picture caption generation with the use of deep reinforcement mastering (RL) that combines convolution neural networks (CNNs) with RL. The paper first introduces a country...
详细信息
暂无评论