Results 1 to 10 of about 83,801 (268)

Quality-time-complexity universal intelligence measurement [PDF]

open access: yesInternational Journal of Crowd Science, 2018
Purpose - With the development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more autonomous and smart.
Jing Liu   +5 more
doaj   +3 more sources

UbiMeta: A Ubiquitous Operating System Model for Metaverse

open access: yesInternational Journal of Crowd Science, 2023
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen   +10 more
doaj   +1 more source

Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B

open access: yesBig Data and Cognitive Computing, 2021
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink   +6 more
doaj   +1 more source

High-fidelity point cloud completion with low-resolution recovery and noise-aware upsampling

open access: yesGraphical Models, 2023
Completing an unordered partial point cloud is a challenging task. Existing approaches that rely on decoding a latent feature to recover the complete shape, often lead to the completed point cloud being over-smoothing, losing details, and noisy.
Ren-Wu Li   +4 more
doaj   +1 more source

A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control

open access: yesIEEE Access, 2020
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj   +1 more source

Smart Contract-Based Trusted Content Retrieval Mechanism for NDN

open access: yesIEEE Access, 2020
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song   +4 more
doaj   +1 more source

Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks

open access: yesIEEE Access, 2019
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang   +7 more
doaj   +1 more source

Dimensionality Reduction for Human Activity Recognition Using Google Colab

open access: yesInformation, 2020
Human activity recognition (HAR) is a classification task that involves predicting the movement of a person based on sensor data. As we can see, there has been a huge growth and development of smartphones over the last 10–15 years—they could be used as a
Sujan Ray   +2 more
doaj   +1 more source

Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach

open access: yesIEEE Access, 2023
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil   +3 more
doaj   +1 more source

Publishing Node Strength Distribution With Node Differential Privacy

open access: yesIEEE Access, 2020
The challenge of graph data publishing under node-differential privacy mainly comes from the high sensitivity of the query. Compared with edge-differential privacy that can only protect the relationship between people, node-differential privacy can ...
Ganghong Liu, Xuebin Ma, Wuyungerile Li
doaj   +1 more source

Home - About - Disclaimer - Privacy