Vehicular Cloud Computing (VCC) offers a promising platform for supporting various automotive applications and services. However, its distributed and dynamic nature makes it susceptible to Denial-of-Service (DoS) atta...
详细信息
The use of group classifiers on similar features has resulted in computationally expensive and tedious, making them unsuitable for online applications. The clustering techniques are evaluated for both inter-subject an...
详细信息
Collaborative Perception (CP) has shown a promising technique for autonomous driving, where multiple connected and autonomous vehicles (CAVs) share their perception information to enhance the overall perception perfor...
Pancreatic cancer poses a significant challenge in early detection and treatment due to its malignant nature within the digestive tract. Recent studies, such as those conducted by the Pancreatic Cancer Action Network,...
详细信息
In recent years, the adoption of 5G has significantly increased due to its numerous benefits, including high availability, lower latency, improved reliability, and high performance. To manage packet flow, 5G relies on...
详细信息
The emergence of 6G networks requires innovative antenna designs that operate at extremely high frequencies. The proposed paper explores the application of advanced machine learning techniques to optimize the design o...
详细信息
In recent years, there's been a surge in the popularity and affordability of distributed power generation equipment, such as photovoltaic systems (PV) and energy storage systems. At present, however, most solution...
详细信息
Current language models decode text token by token according to probabilistic distribution, and determining the appropriate candidates for the next token is crucial to ensure generation *** study introduces adaptive d...
详细信息
Current language models decode text token by token according to probabilistic distribution, and determining the appropriate candidates for the next token is crucial to ensure generation *** study introduces adaptive decoding, a mechanism that dynamically empowers language models to ascertain a sensible candidate set during ***, we introduce an entropy-based metric called confidence and conceptualize determining the optimal candidate set as a confidence-increasing *** rationality of including a token in the candidate set is assessed by leveraging the increment of *** results reveal that our method balances diversity and coherence *** human evaluation shows that our method can generate human-preferred ***, our method can potentially improve the reasoning ability of language models. Copyright 2024 by the author(s)
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no centr...
详细信息
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no central *** nodes on the network mine or verify the data recorded on the *** is a distributed ledger that may be used to keep track of transactions between several *** one can tamper with the data on the blockchain since it is *** the blocks are connected by hashes,the transaction data is *** is managed by a system that is based on the consensus of network users rather than a central *** immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and ***,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s *** is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain *** paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing *** builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack *** contracts are also used to send automatic early warning replies to possible attack *** tests are used to verify the feasibility and efficacy of the suggested model.
Mangoes are one of the most popular fruits worldwide due to their taste and nutrition. Plant diseases may reduce plant quantity and quality. Disease management to improve crop quality and productivity requires early p...
详细信息
暂无评论