This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i...
详细信息
Network traffic anomaly detection plays a crucial role in today's network security and performance management. In response to the challenges in current network traffic data processing, such as insufficient structu...
详细信息
Hybrid deposition with microrolling is a promising arc-based direct energy deposition technique to rapidly build complex parts,whose performance is comparable to that of their wrought *** forming conditions and bead m...
详细信息
Hybrid deposition with microrolling is a promising arc-based direct energy deposition technique to rapidly build complex parts,whose performance is comparable to that of their wrought *** forming conditions and bead morphologies pose difficulties in controlling the morphologies from a single weld bead to built part profiles,and these difficulties hinder the widespread application of the ***,a model that can automatically generate optimal process parameters on the basis of the infrared image,including thermal information and the point cloud information of the target weld bead,is *** show that the errors in critical parameters,namely,feed speed,travel speed,and rolling force,are below 0.4%,0.9%,and 2%,respectively,indicating that the proposed technique outperforms the compared ***,validation reveals that the actual depositing bead is similar(deviation below 0.05 mm)to the target *** proposed strategy provides an effective foundation for dynamic path planning and can considerably improve printing efficiency and precision.
Surveillance cameras have been widely used for monitoring in both private and public sectors as a security *** Circuits Television(CCTV)Cameras are used to surveillance and monitor the normal and anomalous ***-world a...
详细信息
Surveillance cameras have been widely used for monitoring in both private and public sectors as a security *** Circuits Television(CCTV)Cameras are used to surveillance and monitor the normal and anomalous ***-world anomaly detection is a significant challenge due to its complex and diverse *** is difficult to manually analyze because vast amounts of video data have been generated through surveillance systems,and the need for automated techniques has been raised to enhance detection *** paper proposes a novel deep-stacked ensemble model integrated with a data augmentation approach called Stack Ensemble Road Anomaly Detection(SERAD).SERAD is used to detect and classify the four most happening road anomalies,such as accidents,car fires,fighting,and snatching,through road surveillance videos with high *** SERAD adapted three pre-trained Convolutional Neural Networks(CNNs)models,namely VGG19,ResNet50 and *** stacking technique is employed to incorporate these three models,resulting in much-improved accuracy for classifying road abnormalities compared to individual ***,it presented a custom real-world Road Anomaly Dataset(RAD)comprising a comprehensive collection of road images and *** experimental results demonstrate the strength and reliability of the proposed SERAD model,achieving an impressive classification accuracy of 98.7%.The results indicate that the proposed SERAD model outperforms than the individual CNN base models.
With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data *** previous direct and indirect u...
详细信息
With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data *** previous direct and indirect user revocation schemes implemented large-scale user revocation, they faced heavy communication and computational costs. To address these challenges, this study presents a new encryption scheme that combines ciphertext-policy attribute-based encryption(CP-ABE) with puncturable encryption to achieve efficient and flexible user revocation. We design a proxy server to reduce the computational overhead in the decryption phase. Because the puncture process is performed on a semi-honest cloud, we use the digital signature method to verify the correctness of its operation. Furthermore, we prove the security of our scheme under the chosen-plaintext attack(CPA), and compare it with other schemes to highlight its advantages. Numerical analysis and experimental simulation results reveal that our scheme is more suitable than other schemes for use in a cloud environment for user revocation.
This paper presents a review study that explores the landscape and challenges of AI-assisted impact analysis in software requirements engineering. The growth of complex and change-prone software systems has highlighte...
详细信息
Marine umbilical is one of the key equipment for subsea oil and gas exploitation,which is usually integrated by a great number of different functional components with *** layout of these components directly affects ma...
详细信息
Marine umbilical is one of the key equipment for subsea oil and gas exploitation,which is usually integrated by a great number of different functional components with *** layout of these components directly affects manufacturing,operation and storage performances of the *** the multi-layer cross-sectional layout design of the umbilical,a quantifiable multi-objective optimization model is established according to the operation and storage *** the manufacturing factors,the multi-layering strategy based on contact point identification is introduced for a great number of functional ***,the GA-GLM global optimization algorithm is proposed combining the genetic algorithm and the generalized multiplier method,and the selection operator of the genetic algorithm is improved based on the steepest descent *** algorithm is used to find the optimal solution in the global space,which can converge from any initial layout to the feasible layout *** feasible layout solution is taken as the initial value of the generalized multiplier method for fast and accurate ***,taking umbilicals with a great number of components as examples,the results show that the cross-sectional performance of the umbilical obtained by optimization algorithm is better and the solution efficiency is ***,the multi-layering strategy is effective and *** design method proposed in this paper can quickly obtain the optimal multi-layer cross-sectional layout,which replaces the manual design,and provides useful reference and guidance for the umbilical industry.
A chatbot is an intelligent agent that developed based on Natural language processing (NLP) to interact with people in a natural language. The development of multiple deep NLP models has allowed for the creation ...
详细信息
Electroencephalography (EEG) based emotion recognition shows promise in human-computer interaction and mental health monitoring, but faces challenges in cross-dataset generalization. This study introduces the Unified ...
详细信息
Session-based recommendation(SBR)and multibehavior recommendation(MBR)are both important problems and have attracted the attention of many researchers and *** from SBR that solely uses one single type of behavior sequ...
详细信息
Session-based recommendation(SBR)and multibehavior recommendation(MBR)are both important problems and have attracted the attention of many researchers and *** from SBR that solely uses one single type of behavior sequences and MBR that neglects sequential dynamics,heterogeneous SBR(HSBR)that exploits different types of behavioral information(e.g.,examinations like clicks or browses,purchases,adds-to-carts and adds-to-favorites)in sequences is more consistent with real-world recommendation scenarios,but it is rarely *** efforts towards HSBR focus on distinguishing different types of behaviors or exploiting homogeneous behavior transitions in a sequence with the same type of ***,all the existing solutions for HSBR do not exploit the rich heterogeneous behavior transitions in an explicit way and thus may fail to capture the semantic relations between different types of ***,all the existing solutions for HSBR do not model the rich heterogeneous behavior transitions in the form of graphs and thus may fail to capture the semantic relations between different types of *** limitation hinders the development of HSBR and results in unsatisfactory *** a response,we propose a novel behavior-aware graph neural network(BGNN)for *** BGNN adopts a dual-channel learning strategy for differentiated modeling of two different types of behavior sequences in a ***,our BGNN integrates the information of both homogeneous behavior transitions and heterogeneous behavior transitions in a unified *** then conduct extensive empirical studies on three real-world datasets,and find that our BGNN outperforms the best baseline by 21.87%,18.49%,and 37.16%on average correspondingly.A series of further experiments and visualization studies demonstrate the rationality and effectiveness of our *** exploratory study on extending our BGNN to handle more than two types of behaviors show that our BGNN can e
暂无评论