Major disasters can often destroy communication networks. To address this issue, companies such as NTT have developed movable base stations (MBSs), which can be easily deployed to construct an emergency communication ...
Major disasters can often destroy communication networks. To address this issue, companies such as NTT have developed movable base stations (MBSs), which can be easily deployed to construct an emergency communication network. A sample of how MBSs can be connected to form a network can be seen in Fig. 1. However, these networks have performance drawbacks. In order to improve their performance, we propose an algorithm that determines the best way for the MBSs to be connected. The proposed model and algorithm resulted in a reduction in the overall delay and average delay of the system compared to the greedy algorithm. For the realistic constraints, the genetic algorithm (GA) was so successful that its worst-case delay almost matched the average delay of the greedy algorithm. The simulations did show that for extremely high communication rates or extremely slow processing rates, the impact of the topology on the system delay was minimal, and thus both algorithms had similar results. This is because the system bottleneck in these cases is the processing times. However, for the realistic network constraints, the GA outperforms the greedy algorithm by approximately 40% in the fog system and 90% in the cloud system.
The most important deliverable of the requirements engineering process is the software/system requirements specification (SRS) document. Requirements documentation is important during the complete software development...
详细信息
Pull Requests (PRs) that are neither progressed nor resolved clutter the list of PRs, making it difficult for the maintainers to manage and prioritize unresolved PRs. To automatically track, follow up, and close such ...
详细信息
Data science techniques used in the past era for data extraction are now being replaced by data mining methods due to a lot of contemporary trends and challenges. Data mining includes implicit data extraction, which i...
详细信息
The security of computer networks is increasingly difficult to maintain due to the rising complexity and frequency of cyber-attacks. Important tools for finding and neutralizing these dangers are intrusion detection s...
The security of computer networks is increasingly difficult to maintain due to the rising complexity and frequency of cyber-attacks. Important tools for finding and neutralizing these dangers are intrusion detection systems. This study sets out to do a thorough examination and comparison of the efficacy of several machine learning algorithms for use in intrusion detection. This research study evaluates the efficacy of several machine learning algorithms in correctly categorizing instances of network traffic as normal or invasive via extensive experiments performed on representative datasets. Algorithms like random forests, decision trees, SVMs, DL models and NNs are all being tested and rated. Effectiveness is measured and compared using a variety of performance indicators including accuracy, recall, precision, false positive rate, and F1-score. The results of this study emphasize the potential of deep learning models and Random Forests for use in intrusion detection and add to the body of knowledge around machine learning methods for this task. Professionals in the field of network security might use the results to their advantage when building intrusion detection systems. Future research areas are also mentioned, which will hopefully lead to even greater improvements in the field and safer, more reliable intrusion detection systems.
Emotion significantly affects our daily behaviors and interactions. Although recent generative AI models, such as large language models, have shown impressive performance in various tasks, it remains unclear whether t...
Emotion significantly affects our daily behaviors and interactions. Although recent generative AI models, such as large language models, have shown impressive performance in various tasks, it remains unclear whether they truly comprehend emotions and why. This paper aims to address this gap by incorporating psychological theories to gain a holistic understanding of emotions in generative AI models. Specifically, we propose three approaches: 1) EmotionPrompt to enhance the performance of the AI model, 2) EmotionAttack to impair the performance of the AI model, and 3) EmotionDecode to explain the effects of emotional stimuli, both benign and malignant. Through extensive experiments involving language and multi-modal models on semantic understanding, logical reasoning, and generation tasks, we demonstrate that both textual and visual EmotionPrompt can boost the performance of AI models while EmotionAttack can hinder it. More importantly, EmotionDecode reveals that AI models can comprehend emotional stimuli similar to the dopamine mechanism in the human brain. Our work heralds a novel avenue for exploring psychology to enhance our understanding of generative AI models, thus boosting the research and development of human-AI collaboration and mitigating potential risks.
This study presents the effects of Tx./Rx. pointing errors on the performance efficiency of local area optical wireless communication networks. The received signal power and max Q factor are measured in the presence o...
详细信息
In this paper, we utilize ANNs to investigate how medicine dosing and management might be improved for the elderly population. The suggested strategy calls for the use of patient-specific data as inputs for the ANNs, ...
In this paper, we utilize ANNs to investigate how medicine dosing and management might be improved for the elderly population. The suggested strategy calls for the use of patient-specific data as inputs for the ANNs, such as age, renal and hepatic function, body mass index, and preexisting prescription profiles. The neural network model dynamically changes drug doses using the combination of the Multilayer Perceptron (MLP) algorithm, Backpropagation, and the Stochastic Gradient Descent (SGD) algorithm to maximize therapeutic benefits and reduce the likelihood of adverse drug events. The research highlights the improved accuracy, sensitivity, specificity, precision, and F1 score of the suggested technique compared to numerous conventional methods. As a result, the suggested system has great potential to revolutionize medication management for the elderly population since it is more personalized, flexible, patient-safe, effective, and efficient in its use of resources.
Latent diffusion models achieve state-of-the-art performance on a variety of generative tasks, such as image synthesis and image editing. However, the robustness of latent diffusion models is not well studied. Previou...
详细信息
Designing a safe electronic voting system offering secrecy with impartial approach while being transparent and flexible is a challenging task. Full Stack decentralized applications are smart contract decentralized app...
详细信息
ISBN:
(纸本)9781665474177
Designing a safe electronic voting system offering secrecy with impartial approach while being transparent and flexible is a challenging task. Full Stack decentralized applications are smart contract decentralized application that runs on a Decentralized Blockhain Network. Problems constructing a vote casting software at the Central Web Server are: the votes at the database will be modified and will be counted extra or eliminated entirely, also the supply code at the net server can also be modified at any time. Rather than having a separate central server database we can deploy Blockchain. Blockchain is a network and database which handles all the transaction. Blocks on the network are added if the transaction is valid and the Blocks also ensure that the data distributed across the Blockchain network are valid. In this paper, we will elaborate the design and development of a Decentralized Approach for Election Voting System using Solidity language to make our smart contract. This Decentralized Approach will have the option for the voter to cast a vote in an election by their Ethereum account address which has public and private key address. This approach aims to provide a secure and trusted voting transaction.
暂无评论