Results 1 to 10 of about 83,801 (268)
Quality-time-complexity universal intelligence measurement [PDF]
Purpose - With the development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more autonomous and smart.
Jing Liu +5 more
doaj +3 more sources
UbiMeta: A Ubiquitous Operating System Model for Metaverse
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen +10 more
doaj +1 more source
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink +6 more
doaj +1 more source
High-fidelity point cloud completion with low-resolution recovery and noise-aware upsampling
Completing an unordered partial point cloud is a challenging task. Existing approaches that rely on decoding a latent feature to recover the complete shape, often lead to the completed point cloud being over-smoothing, losing details, and noisy.
Ren-Wu Li +4 more
doaj +1 more source
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj +1 more source
Smart Contract-Based Trusted Content Retrieval Mechanism for NDN
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song +4 more
doaj +1 more source
Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang +7 more
doaj +1 more source
Dimensionality Reduction for Human Activity Recognition Using Google Colab
Human activity recognition (HAR) is a classification task that involves predicting the movement of a person based on sensor data. As we can see, there has been a huge growth and development of smartphones over the last 10–15 years—they could be used as a
Sujan Ray +2 more
doaj +1 more source
Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil +3 more
doaj +1 more source
Publishing Node Strength Distribution With Node Differential Privacy
The challenge of graph data publishing under node-differential privacy mainly comes from the high sensitivity of the query. Compared with edge-differential privacy that can only protect the relationship between people, node-differential privacy can ...
Ganghong Liu, Xuebin Ma, Wuyungerile Li
doaj +1 more source

