|
|
|
Anton Dolhopolov, Arnaud Castelltort and Anne Laurent
Analytical data platforms have been used for decades to improve organizational performance. Starting from the data warehouses used primarily for structured data processing, through the data lakes oriented for raw data storage and post-hoc data analyses, ...
ver más
|
|
|
|
|
|
|
Meghana Thiyyakat, Subramaniam Kalambur and Dinkar Sitaram
The use of data centers is ubiquitous, as they support multiple technologies across domains for storing, processing, and disseminating data. IoT applications utilize both cloud data centers and edge data centers based on the nature of the workload. Due t...
ver más
|
|
|
|
|
|
|
Lu Han, Xiaohong Huang, Dandan Li and Yong Zhang
In the ring-architecture-based federated learning framework, security and fairness are severely compromised when dishonest clients abort the training process after obtaining useful information. To solve the problem, we propose a Ring- architecture-based ...
ver más
|
|
|
|
|
|
|
Elena Fedorchenko, Evgenia Novikova and Anton Shulepov
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a sourc...
ver más
|
|
|
|
|
|
|
Hanyue Xu, Kah Phooi Seng, Jeremy Smith and Li Minn Ang
In the context of smart cities, the integration of artificial intelligence (AI) and the Internet of Things (IoT) has led to the proliferation of AIoT systems, which handle vast amounts of data to enhance urban infrastructure and services. However, the co...
ver más
|
|
|
|
|
|
|
Tarafder Elmi Tabassum, Zhengjia Xu, Ivan Petrunin and Zeeshan A. Rana
To enhance system reliability and mitigate the vulnerabilities of the Global Navigation Satellite Systems (GNSS), it is common to fuse the Inertial Measurement Unit (IMU) and visual sensors with the GNSS receiver in the navigation system design, effectiv...
ver más
|
|
|
|
|
|
|
Paolo Bocciarelli and Andrea D?Ambrogio
Modeling and simulation (M&S) techniques are effectively used in many application domains to support various operational tasks ranging from system analyses to innovative training activities. Any (M&S) effort might strongly benefit from the adopti...
ver más
|
|
|
|
|
|
|
Shiva Raj Pokhrel and Michel Mandjes
We consider multipath TCP (MPTCP) flows over the data networking dynamics of IEEE 802.11ay for drone surveillance of areas using high-definition video streaming. Mobility-induced handoffs are critical in IEEE 802.11ay (because of the smaller coverage of ...
ver más
|
|
|
|
|
|
|
Olivier Debauche, Jean Bertin Nkamla Penka, Saïd Mahmoudi, Xavier Lessage, Moad Hani, Pierre Manneback, Uriel Kanku Lufuluabu, Nicolas Bert, Dounia Messaoudi and Adriano Guttadauria
The aging of the world?s population, the willingness of elderly to remain independent, and the recent COVID-19 pandemic have demonstrated the urgent need for home-based diagnostic and patient monitoring systems to reduce the financial and organizational ...
ver más
|
|
|
|
|
|
|
Ana B. Gil, Fernando de la Prieta, Sara Rodríguez and Juan M. Corchado
The education sector is a major generator, consumer, and depositary of educational content. Thanks to technological advances, today?s educators and learners have ubiquitous and on-demand access to information. Technology has made it possible for us to co...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|
|
|
|
Shao-Ming Lee and Ja-Ling Wu
Recently, federated learning (FL) has gradually become an important research topic in machine learning and information theory. FL emphasizes that clients jointly engage in solving learning tasks. In addition to data security issues, fundamental challenge...
ver más
|
|
|
|
|
|
|
Addi Ait-Mlouk, Sadi A. Alawadi, Salman Toor and Andreas Hellander
Machine reading comprehension (MRC) of text data is a challenging task in Natural Language Processing (NLP), with a lot of ongoing research fueled by the release of the Stanford Question Answering Dataset (SQuAD) and Conversational Question Answering (Co...
ver más
|
|
|
|
|
|
|
V. J. Anand,Himawan Gunadhi
A data warehouse facilitates the integration of disparate operational databases in an enterprise into a single store. The warehouse then provides knowledge workers with easy access to historical, summarized and other forms of aggregated data. A major fla...
ver más
|
|
|
|
|
|
|
Mikael Sabuhi, Petr Musilek and Cor-Paul Bezemer
As the number of machine learning applications increases, growing concerns about data privacy expose the limitations of traditional cloud-based machine learning methods that rely on centralized data collection and processing. Federated learning emerges a...
ver más
|
|
|
|
|
|
|
Evgenia Novikova, Elena Doynikova and Sergey Golubev
One of the challenges in the Internet of Things systems is the security of the critical data, for example, data used for intrusion detection. The paper research construction of an intrusion detection system that ensures the confidentiality of critical da...
ver más
|
|
|
|
|
|
|
Christian Moya and Guang Lin
The Deep Operator Network (DeepONet) framework is a different class of neural network architecture that one trains to learn nonlinear operators, i.e., mappings between infinite-dimensional spaces. Traditionally, DeepONets are trained using a centralized ...
ver más
|
|
|
|
|
|
|
Nadiyanti Mat Nayan,David S Jones,Suriati Ahmad
Pág. 151 - 156
In 1880, when the British moved their Federated Malay States administrative centre to Kuala Lumpur, the Padang quickly became a symbol of British economic and administrative colonisation, and a nucleus of the socio-cultural development of Kuala Lumpur. T...
ver más
|
|
|
|