In this paper, we describe our approach to CLEF 2024 Lab 2 CheckThat! Task 1 (Check-worthiness) and Task 2 (Subjectivity), which aims to evaluate how consistent Large Language Models (LLMs) can distinguish between obj...
详细信息
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avo...
详细信息
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avoid ***,optimal path selection to route traffic between the origin and destination is *** research proposed a realistic strategy to reduce traffic management service response time by enabling real-time content distribution in IoV systems using heterogeneous network ***,this work proposed a novel use of the Ant Colony Optimization(ACO)algorithm and formulated the path planning optimization problem as an Integer Linear Program(ILP).This integrates the future estimation metric to predict the future arrivals of the vehicles,searching the optimal *** the mobile nature of IOV,fuzzy logic is used for congestion level estimation along with the ACO to determine the optimal *** model results indicate that the suggested scheme outperforms the existing state-of-the-art methods by identifying the shortest and most cost-effective ***,this work strongly supports its use in applications having stringent Quality of Service(QoS)requirements for the vehicles.
This article presents a protocol for conducting online think-aloud interviews as well as the reflections of the participants and interviewer on this process. The interviewer and participants commenced the interviews i...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twi...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twin(DT)*** widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical *** create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT *** high volume of user data and the ubiquitous communication systems in DTNs come with their own set of *** most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data ***,currently,there is not enough literature that focuses on privacy and security issues in DTN *** this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their ***,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective *** then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the *** also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the ***,we provide some open research issues and problems in the field of DTN privacy and security.
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
Purpose: This paper is focused on the role of ChatGPT an artificial intelligence (AI) language model in the area of sports trauma. Sports trauma represents some significant concerns due to its prevalence and impacts. ...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
In this paper we consider the following 2-Central Path Problem (2CPP): Given a set of m polygonal curves = {P1,P2,...,Pm} in the plane, find two curves Pu and Pl, called 2-central paths, that best represent all curves...
详细信息
In this paper we consider the problem of training a Support Vector Machine (SVM) online using a stream of data in random order. We provide a fast online training algorithm for general SVM on very large datasets. Based...
详细信息
Smartphones offer a wide range of applications globally, and usability is a key factor in their quality. Human-computer Interaction (HCI) continuously evolves to enhance usability by improving user interface (UI) comp...
详细信息
暂无评论