-
901
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01“…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
Get full text
Article -
902
16QAM Blind Equalization via Maximum Entropy Density Approximation Technique and Nonlinear Lagrange Multipliers
Published 2014-01-01“…Recently a new blind equalization method was proposed for the 16QAM constellation input inspired by the maximum entropy density approximation technique with improved equalization performance compared to the maximum entropy approach, Godard’s algorithm, and others. In addition, an approximated expression for the minimum mean square error (MSE) was obtained. …”
Get full text
Article -
903
Robust Planning for Hydrogen-Based Multienergy System Considering P2HH and Seasonal Hydrogen Storage
Published 2024-01-01“…Since renewable energy is rapidly growing in the active distribution networks, the integrated energy system coupled with energy storage is a promising way to address the intermittent issues of renewable sources. …”
Get full text
Article -
904
One Iteration method in Numerical solution of Endemic Models with arbitrarily distributed periods of infection for long time
Published 2025-01-01“…Organization of the given algorithm is such that the problem is solved by a numerical iteration on union of short time intervals, and the process forward interval by interval. …”
Get full text
Article -
905
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
Published 2022-12-01“… The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. …”
Get full text
Article -
906
Adaptive Asymmetric Real Laplace Wavelet Filtering and Its Application on Rolling Bearing Early Fault Diagnosis
Published 2019-01-01“…To overcome this issue, the present paper comes up with a rolling bearing fault-diagnosing approach based on adaptive asymmetric real Laplace wavelet (ARLW) filtering, which is on the strength of water cycle optimization algorithm (WCA). Firstly, ARLW is introduced to filter the initial vibration signal since its waveform has the same asymmetric structure as the fault impact. …”
Get full text
Article -
907
Studying Three Abstract Artists Based on a Multiplex Network Knowledge Representation
Published 2021-01-01“…We used the recently proposed MultiRank algorithm to suggest possible explanations of the dynamic of some artistic styles. …”
Get full text
Article -
908
Sentiment Analysis Twitter Bahasa Indonesia Berbasis WORD2VEC Menggunakan Deep Convolutional Neural Network
Published 2020-02-01“…The results of experiments that have been carried out with the Deep Convolutional Neural Network algorithm have the best accuracy value of 76.40%. …”
Get full text
Article -
909
Estimation of the Time of Occurrence of the Maximum Electrical Demand by Selecting the Optimal Classification Model and Making Use of Unbalanced Data
Published 2024-12-01“…To predict the time of maximum demand, supervised machine learning algorithms were used: random forests, K nearest neighbors, support vector machine, and logistic regression. …”
Get full text
Article -
910
Channel Estimation for Switch-Based Millimeter-Wave Communications via Atomic Norm
Published 2021-01-01“…We then propose an efficient algorithm to solve this problem based on Wirtinger projection. …”
Get full text
Article -
911
Experimental Demonstration of a Cubic-Receiver-Based MIMO Visible Light Communication System
Published 2017-01-01“…Besides, the system can support user mobility in real time, since it does not require the receiver adjustment and alignment.…”
Get full text
Article -
912
The Support Vector Regression with L1 Norm: Application to Weather Radar Data in Adjusting Rainfall Errors
Published 2023-06-01“…The paper depicts the methodological base of the algorithm that covers additive and multiplicative corrections and the results of practical implementations considering the locations of gauge measurements. …”
Get full text
Article -
913
SPOTting Model Parameters Using a Ready-Made Python Package.
Published 2015-01-01“…They further show the benefit of having one package at hand that includes number of well performing parameter search methods, since not every case study can be solved sufficiently with every algorithm or every objective function.…”
Get full text
Article -
914
A Novel Mechanism for Fire Detection in Subway Transportation Systems Based on Wireless Sensor Networks
Published 2013-11-01“…Fusion of data decreases the amount of useful information since the distribution of data is not considered. …”
Get full text
Article -
915
Satellite Geodesy Captures Offset Magma Supply Associated With Lava Lake Appearance at Masaya Volcano, Nicaragua
Published 2018-03-01“…The center of inflation is located in the NW part of the caldera, north of the active Santiago vent which has hosted a new lava lake since 11 December 2015. Simultaneous inversions of those Interferometric Synthetic Aperture Radar data sets using a neighbourhood algorithm demonstrate that a spherical magma reservoir explains the geodetic data, with a horizontal location ∼3 km north of the active Santiago vent and a depth‐to‐center ∼3 km. …”
Get full text
Article -
916
Optimizing the Joint Replenishment and Delivery Scheduling Problem under Fuzzy Environment Using Inverse Weight Fuzzy Nonlinear Programming Method
Published 2014-01-01“…Thirdly, the fuzzy simulation approach and differential evolution algorithm (DE) are utilized to solve this problem. …”
Get full text
Article -
917
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“…The purpose of this research is to determine the best and most effective algorithm among the three competitive spatial domain algorithms, which are Least Significant Bit (LSB), Optimum Pixel Adjustment Procedure (OPAP), and Pixel Value Differencing (PVD) which in regard demonstrated the efficacy of spatial domain algorithms. …”
Get full text
Article -
918
A Survey of Localization in Wireless Sensor Network
Published 2012-12-01“…Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. …”
Get full text
Article -
919
LX-mixers for QAOA: Optimal mixers restricted to subspaces and the stabilizer formalism
Published 2024-11-01“…Overall, we hope that this new perspective can lead to further insight into the development of quantum algorithms.…”
Get full text
Article -
920
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives
Published 2025-05-01“…Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations, researchers have been working on building post-quantum homomorphic encryption (PQHE) algorithms. …”
Get full text
Article