As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many softwareengineering tasks such as program classification [1] and defect detection. Ear...
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many softwareengineering tasks such as program classification [1] and defect detection. Earlier approaches treat the code as token sequences and use CNN, RNN, and the Transformer models to learn code representations.
Background The sense of touch plays a crucial role in interactive behavior within virtual spaces,particularly when visual attention is *** haptic feedback has been widely used to compensate for the lack of visual cues...
详细信息
Background The sense of touch plays a crucial role in interactive behavior within virtual spaces,particularly when visual attention is *** haptic feedback has been widely used to compensate for the lack of visual cues,the use of tactile information as a predictive feedforward cue to guide hand movements remains unexplored and lacks theoretical *** This study introduces a fingertip aero-haptic rendering method to investigate its effectiveness in directing hand movements during eyes-free spatial *** wearable device incorporates a multichannel micro-airflow chamber to deliver adjustable tactile effects on the *** The first study verified that tactile directional feedforward cues significantly improve user capabilities in eyes-free target acquisition and that users rely heavily on haptic indications rather than spatial memory to control their hands.A subsequent study examined the impact of enriched tactile feedforward cues on assisting users in determining precise target positions during eyes-free interactions,and assessed the required learning *** The haptic feedforward effect holds great practical promise in eyeless design for virtual *** aim to integrate cognitive models and tactile feedforward cues in the future,and apply richer tactile feedforward information to alleviate users'perceptual deficiencies.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
To informatively plan optimal paths for autonomous mobile robots in indoor environment is essential in real life cases. In view of the shortcomings of the traditional path planning strategies based on the cameras moun...
详细信息
作者:
Vijayan, R.Mareeswari, V.Jaswanth, A.B.
Department of Information Technology Tamilnadu Vellore India
Department of Software and Systems Tamilnadu Vellore India
Software Engineering Tamilnadu Vellore India
With the existing deep learning models in predicting multiple diseases primarily focus on analyzing individual diseases in isolation, lacking a unified system for multi-disease prediction. This project presents an app...
详细信息
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this pa...
详细信息
To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model,this paper proposes a network attack-defense game model(ADGM).Firstly,based on the assumption of incomplete information between the two sides of the game,the ADGM model is established,and methods of payoff quantification,equilibrium solution,and determination of strategy confrontation results are ***,drawing on infectious disease dynamics,the network attack-defense situation is defined based on the density of nodes in various security states,and the transition paths of network node security states are ***,the network zero-day virus attack-defense behaviors are analyzed,and comparative experiments on the attack-defense evolution trends under the scenarios of different strategy combinations,interference methods,and initial numbers are conducted using the NetLogo simulation *** experimental results indicate that this model can effectively analyze the evolution of the macro-level network attack-defense situation from the micro-level attack-defense *** instance,in the strategy selection experiment,when the attack success rate decreases from 0.49 to 0.29,the network destruction rate drops by 11.3%,in the active defense experiment,when the interference coefficient is reduced from 1 to 0.7,the network destruction rate decreases by 7%,and in the initial node number experiment,when the number of initially infected nodes increases from 10 to 30,the network destruction rate rises by 3%.
Pneumonia is a dangerous respiratory disease due to which breathing becomes incredibly difficult and painful;thus,catching it early is *** physicians’time is limited in outdoor situations due to many patients;therefo...
详细信息
Pneumonia is a dangerous respiratory disease due to which breathing becomes incredibly difficult and painful;thus,catching it early is *** physicians’time is limited in outdoor situations due to many patients;therefore,automated systems can be a *** input images from the X-ray equipment are also highly unpredictable due to variances in radiologists’***,radiologists require an automated system that can swiftly and accurately detect pneumonic lungs from chest *** medical classifications,deep convolution neural networks are commonly *** research aims to use deep pretrained transfer learning models to accurately categorize CXR images into binary classes,i.e.,Normal and *** MDEV is a proposed novel ensemble approach that concatenates four heterogeneous transfer learning models:Mobile-Net,DenseNet-201,EfficientNet-B0,and VGG-16,which have been finetuned and trained on 5,856 CXR *** evaluation matrices used in this research to contrast different deep transfer learning architectures include precision,accuracy,recall,AUC-roc,and *** model effectively decreases training loss while increasing *** findings conclude that the proposed MDEV model outperformed cutting-edge deep transfer learning models and obtains an overall precision of 92.26%,an accuracy of 92.15%,a recall of 90.90%,an auc-roc score of 90.9%,and f-score of 91.49%with minimal data pre-processing,data augmentation,finetuning and hyperparameter adjustment in classifying Normal and Pneumonia chests.
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(...
详细信息
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(ZSFA),has become increasingly important in both academia and *** ZSFA methods mainly focus on extracting discriminative features between spoofing and living ***,the nature of the spoofing faces is to trick anti-spoofing systems by mimicking the livings,therefore the deceptive features between the known attacks and the livings,which have been ignored by existing ZSFA methods,are essential to comprehensively represent the ***,existing ZSFA models are incapable of learning the complete representations of living faces and thus fall short of effectively detecting newly emerged *** tackle this problem,we propose an innovative method that effectively captures both the deceptive and discriminative features distinguishing between genuine and spoofing *** method consists of two main components:a two-against-all training strategy and a semantic *** two-against-all training strategy is employed to separate deceptive and discriminative *** address the subsequent invalidation issue of categorical functions and the dominance disequilibrium issue among different dimensions of features after importing deceptive features,we introduce a modified semantic *** autoencoder is designed to map all extracted features to a semantic space,thereby achieving a balance in the dominance of each feature *** combine our method with the feature extraction model ResNet50,and experimental results show that the trained ResNet50 model simultaneously achieves a feasible detection of unknown attacks and comparably accurate detection of known *** results confirm the superiority and effectiveness of our proposed method in identifying the living with the interference of both known
The continuous miniaturization and high-power development of electronic devices have given rise to severe interface thermal issues,which urgently demand highly thermally conductive thermal interface materials(TIMs)to ...
详细信息
The continuous miniaturization and high-power development of electronic devices have given rise to severe interface thermal issues,which urgently demand highly thermally conductive thermal interface materials(TIMs)to eliminate excessive heat accumulation and ensure the normal operation of devices[1].
暂无评论