Airborne pollen is a significant cause of allergies, leading to various discomforting symptoms. Many cities worldwide, including Beijing, face challenges related to airborne pollen. Accurate forecasting of pollen conc...
详细信息
An insider threat is a malicious action launched by authorized personnel inside the organization. Since insider actions may only leave a small digital footprint in the system, it is considered a major cybersecurity ch...
详细信息
Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources. Typically no common key is available for connecting records. Massive data cle...
详细信息
ISBN:
(纸本)9781665473316
Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources. Typically no common key is available for connecting records. Massive data cleaning and integration processes require completion before any data analytics, or further processing can be performed. Although record linkage is frequently regarded as a somewhat tedious but necessary step, it reveals valuable insights, supports data visualization, and guides further analytic approaches to the data. Here, we focus on organization entity matching. We introduce CompanyName2Vec, a novel algorithm to solve company entity matching (CEM) using a neural network model to learn company name semantics from a job ad corpus, without relying on any information on the matched company besides its name. Based on a real-world data, we show that CompanyName2Vec outperforms other evaluated methods and solves the CEM challenge with an average success rate of 89.3%.
This paper introduces the largest and most diverse e-waste dataset to date, consisting of 19,613 pictures, 28,941 annotations, and 77 classes, where each class represents one visually distinctive type of electronic de...
详细信息
ISBN:
(数字)9798350382365
ISBN:
(纸本)9798350382372
This paper introduces the largest and most diverse e-waste dataset to date, consisting of 19,613 pictures, 28,941 annotations, and 77 classes, where each class represents one visually distinctive type of electronic device. Furthermore, our dataset was structured using the United Nations University's UNU-KEYS classification, which ensures the compatibility of our dataset with the different e-waste classifications used worldwide and allowed us to choose more relevant dataset classes. The proposed methodology for image collection, annotation, and labeling is explained. The advantages and disadvantages of this dataset and how it can be improved in the future are presented. This dataset has been made open source with a permissive CC by 4.0 license so that it can be used to stimulate scientific progress in the field of automatic e-waste recognition, with the end goal of solving the global e-waste problem. The dataset is available online at https://***/electronic-waste-detection/e-waste-dataset-r0ojc.
To address the shortcomings of the marine predators algorithm (MPA) in solving complex problems, such as low optimization accuracy and easily falling into local optimization, this paper proposes an improved marine pre...
详细信息
ISBN:
(纸本)9781665472449
To address the shortcomings of the marine predators algorithm (MPA) in solving complex problems, such as low optimization accuracy and easily falling into local optimization, this paper proposes an improved marine predators algorithm based on group learning (GLMPA). An opposition-based learning method is adopted to enhance the quality of the initial solutions. Then, a group learning strategy is used to diversify the population. Two subgroups are produced by fitness evaluation and employing different updating mechanisms. In addition, a new position-updating rule is used to help the proposed algorithm escape from the local optima in the later stage of iteration. Finally, six test functions are utilized to test the GLMPA, and the simulation results verify the effectiveness of the proposed algorithm when compared with other famous algorithms.
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are...
详细信息
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are also increasing *** order to get a more comprehensive literature review related to SGX,we have made a systematic analysis of the related papers in this *** first search through five large-scale paper retrieval libraries by keywords(i.e.,ACM Digital Library,IEEE/IET Electronic Library,SpringerLink,Web of science,and Elsevier science Direct).We read and analyze a total of 128 SGX-related *** first round of extensive study is conducted to classify *** second round of intensive study is carried out to complete a comprehensive analysis of the paper from various *** start with the working environment of SGX and make a conclusive summary of trusted execution environment(TEE).We then focus on the applications of *** also review and study multifarious attack methods to SGX framework and some recent security improvements made on ***,we summarize the advantages and disadvantages of SGX with some future research *** hope this review could help the existing and future research works on SGX and its application for both developers and users.
As the most critical components in a sentence, subject, predicate and object require special attention in the video captioning task. To implement this idea, we design a novel framework, named COllaborative three-Strea...
详细信息
Applications that support multimedia data such as medical pictures and videos, video broadcasting, and secure video conferencing consume vast quantities of information that require large numbers of servers to provide ...
Applications that support multimedia data such as medical pictures and videos, video broadcasting, and secure video conferencing consume vast quantities of information that require large numbers of servers to provide services for the many client users who access them. Cloud-based sensitive data becomes increasingly important for the respective users to be kept confidential without infringing confidentiality, integrity, and availability. We propose a framework based on the OpenStack cloud-computing platform for multimedia data security. A prototype framework with a helper tool EncSwift is implemented, which allows stringent data access control and applying the data-at-rest Over-Encryption approach. The implementation is evaluated for computation of cryptography operations, cost of communications, and update policy consequences for the framework. With OpenStack Swift's open source and modular design, our multimedia data management and management framework is well suited to protecting and managing clouds' multimedia with low computational costs as shown in the experimental results.
A codebook designed for learning discrete distributions in latent space has demonstrated state-of-the-art results on generation tasks. This inspires us to explore what distribution of codebook is better. Following the...
A codebook designed for learning discrete distributions in latent space has demonstrated state-of-the-art results on generation tasks. This inspires us to explore what distribution of codebook is better. Following the spirit of Kepler's Conjecture, we cast the codebook training as solving the sphere packing problem and derive a Kepler codebook with a compact and structured distribution to obtain a codebook for image representations. Furthermore, we implement the Kepler codebook training by simply employing this derived distribution as regularization and using the codebook partition method. We conduct extensive experiments to evaluate our trained codebook for image reconstruction and generation on natural and human face datasets, respectively, achieving significant performance improvement. Besides, our Kepler codebook has demonstrated superior performance when evaluated across datasets and even for reconstructing images with different resolutions. Codes and pre-trained weights are available at https://***/banianrong/KeplerCodebook
This research study enhances secure data transmission by embedding sensitive information within audio files. Using Python for the frontend and PHP with MySQL as the backend, this approach employs reversible data hidin...
详细信息
ISBN:
(数字)9798331522667
ISBN:
(纸本)9798331522674
This research study enhances secure data transmission by embedding sensitive information within audio files. Using Python for the frontend and PHP with MySQL as the backend, this approach employs reversible data hiding (RDH) to ensure that the original content of the audio file can be fully restored. Audio steganography is used to conceal encrypted messages within a WAV file, leveraging its varying compression rates for optimal steganographic performance. The Least Significant Bit (LSB) technique, a widely used method, embeds the hidden message into the audio stream without noticeable distortion. In this system, the secret message is scrambled, divided into segments, and embedded in even-value bytes of the audio file, with the first bit position chosen randomly for enhanced security. A permutation codebook is employed to rearrange and decrypt the message during recovery, ensuring both data confidentiality and complete reversibility of the audio file. This method provides a secure, efficient solution for transmitting sensitive information through audio channels.
暂无评论