Ensemble Deep Learning Architectures have demonstrated to improve the performance in comparison with the individual architectures composing the ensemble. In the current work, an ensemble of variants of Convolutional a...
详细信息
ISBN:
(纸本)9783030200558;9783030200541
Ensemble Deep Learning Architectures have demonstrated to improve the performance in comparison with the individual architectures composing the ensemble. In the current work, an ensemble of variants of Convolutional and Recurrent Neural Networks architectures are applied to the prediction of the Rn-222 level at the Canfranc Underground Laboratory (Spain). To predict the low-level periods allows appropriately scheduling the maintenance operations in the experiments hosted in the laboratory. As a consequence of the application of Ensemble Deep Learning, an improvement of the forecasting capacity is stated. Furthermore, the learned lessons from this work can be extrapolated to other underground laboratories around the world.
In the present modern scenario, health remains as the top most priority of every human being. The identification of the problem and its diagnosis is complicated and remains as the most important part of it. Recently, ...
详细信息
ISBN:
(纸本)9783030304652;9783030304645
In the present modern scenario, health remains as the top most priority of every human being. The identification of the problem and its diagnosis is complicated and remains as the most important part of it. Recently, many of our health related activities use data in the digital format. Digital data is easy and remains in a more comfortable form for transferring the data over long distances. Exchange of Medical Images must be done in a protective and secured manner due to security threats and the attacks of the unidentified intruders. If the privacy is questionable in medical data sharing, then the life of an individual concerned will remain under risk. This has led to the demand for integrity and authentication of medical images. In this paper, an algorithm based on the Secure Hashing Algorithm is proposed to maintain the medical image's integrity. The Region of Interest (RoI) is separated using spatial co-ordinates and the hash value of the RoI is generated and embedded into the Region of Non-Interest (RoNI) before transmission.
Cloud computing is accessing and handling data and documents from the internet rather than from any individual computer hard drive. The issues faced by cloud computing are security, privacy, vendor lock-in, server dow...
详细信息
ISBN:
(纸本)9783030304652;9783030304645
Cloud computing is accessing and handling data and documents from the internet rather than from any individual computer hard drive. The issues faced by cloud computing are security, privacy, vendor lock-in, server downtime, network connectivity, dependency, vulnerability to attacks, load balancing, etc. Load balancing in cloud computing is one of the important issues as huge amount of load need to be efficiently distributed among the servers. The existing approaches to address load balancing issue are throttled technology, active clustering, central policy for virtual machine, round robin technology, max-min min-min, fuzzy monitoring, honeybee foraging behavior, reinforcement learning, etc. The primary drawbacks of above-mentioned approaches towards load balancing are lowered throughput, high migration rate, overloading and under-loading of resources. This paper proposes a novel architecture which applies apprenticeship learning for load balancing in the cloud. Its performance is found to be good with respect to parameters like response time, accuracy, learning rate and speed.
The Virtual Reality (VR) world is very suggestive as it intensely affects the senses of vision, hearing and to a limited extent touch. It can be expected that in the near future VR will be widely disseminated and used...
详细信息
ISBN:
(纸本)9783030279288;9783030279271
The Virtual Reality (VR) world is very suggestive as it intensely affects the senses of vision, hearing and to a limited extent touch. It can be expected that in the near future VR will be widely disseminated and used by people of all ages, including children. We decided to conduct a qualitative research project to assess children's (aged 7-12) first reactions to the use of VR. Children's opinions and reactions gathered during the interviews indicate that children highly appreciated the attractiveness of the virtual experiences, which were often assessed at a similar or higher level than their real-world counterparts. Our findings clearly suggest that children very easily adopt VR without any prior experience with that technology. We recommend that studies on children's behavior in VR are continued.
Supporting end-to-end personalized Quality of Services (QoS) delivery in existing network architecture is an ongoing issue. Software Defined Networking (SDN) model has emerged in response to the limitations of traditi...
详细信息
ISBN:
(纸本)9783030290290;9783030290283
Supporting end-to-end personalized Quality of Services (QoS) delivery in existing network architecture is an ongoing issue. Software Defined Networking (SDN) model has emerged in response to the limitations of traditional network. Integrating Software Defined Network (SDN) architecture with Service Oriented Architecture (SOA) brings new concept for future service oriented delivery in SDN services. Researchers from both academic and industry are working to resolve the QoS limitations of service delivery, however;most of the proposed solutions are application oriented and unable to provide a reliable personalized QoS delivery in future service oriented SDN. This research propose a reliable Service Level Agreement (SLA) oriented Service Negotiation framework that would be able to provide reputation based personalized service delivery and assist in QoS management in SDN for informed decision making. Moreover, potential benefits of the proposed framework are also discussed in this paper in social, scientific and business aspects.
The paper addresses a problem of lightweight vulnerability detection in program code, represented by MIPS instruction set, which is widely used in network and IoT devices. For these purposes, it is proposed to use the...
详细信息
ISBN:
(纸本)9783030325237;9783030325220
The paper addresses a problem of lightweight vulnerability detection in program code, represented by MIPS instruction set, which is widely used in network and IoT devices. For these purposes, it is proposed to use the Siamese neural network, which was involved both for pre-training the instruction embeddings, and for training the code vulnerability classifier. Instruction embeddings are obtained by solving auxiliary task of matching the semantically equivalent code pieces. Proposed approach has been tested on publicly available dataset and gave positive results.
At present, the fault diagnosis information of the middle and low voltage distribution network is insufficient and scattered, and the fault diagnosis and positioning of the low and low pressure synthesis is urgently n...
详细信息
ISBN:
(纸本)9783030152352;9783030152345
At present, the fault diagnosis information of the middle and low voltage distribution network is insufficient and scattered, and the fault diagnosis and positioning of the low and low pressure synthesis is urgently needed for the comprehensive utilization of power distribution automation, metering automation and 95598 customer service report. This paper carried out based on the large data of low voltage intelligent fault diagnosis and positioning analysis, further enhance the fault of the distribution and grab the dispatcher commander and people with disabilities positioning analysis efficiency, improve the level of fault disposal of the lean management.
Emotional expressions are an important part of daily communication between people. Emotions are commonly transferred non verbally through facial expressions, eye contact and tone of voice. With the rise in social medi...
详细信息
ISBN:
(纸本)9783030311292;9783030311285
Emotional expressions are an important part of daily communication between people. Emotions are commonly transferred non verbally through facial expressions, eye contact and tone of voice. With the rise in social media usage, textual communication in which emotions are expressed has also witnessed a great increase. In this paper automatic emotion intensity prediction from text is addressed. Different approaches are explored to find out the best model to predict the degree of a specific emotion in text. Experimentation was conducted using the dataset provided by SemEval-2018 Task 1: Affect in Tweets. Experiments were conducted to identify regression systems and parameter settings that perform consistently well for this problem space. The presented research highlights the importance of the Transfer Learning approach in inducing knowledge from state of the art models in sentiment analysis for use in the task of emotion intensity prediction.
Fair comparative analysis of opportunistic routing protocols plays a vital role in selecting a suitable routing protocol for various applications of opportunistic networks. In this paper, we have analyzed the performa...
详细信息
ISBN:
(纸本)9789811501326;9789811501319
Fair comparative analysis of opportunistic routing protocols plays a vital role in selecting a suitable routing protocol for various applications of opportunistic networks. In this paper, we have analyzed the performance of the routing protocols, namely, EPIDEMIC, Spray and Wait, PROPHET, First Contact, Direct Delivery, MaxProp, WaveRouter, and LifeRouter. The ONE simulator is used for this empirical study. This study measures the performance of protocols based on Delivery Probability, Overhead Ratio, and Average Latency with different mobility models as well as real-world mobility traces. The simulation results surprisingly show that Spray and Wait outperform all the other protocols in almost all scenarios. Further, CAHM mobility model is able to mimic real-world mobility closely resembling real-world mobility traces of different network densities.
In the 2019 editions of SIR, QS, ARWU and Webometric university rankings, after the process of evaluating and positioning through academic and research quality criteria established in their methodologies, 22 Latin Ame...
详细信息
ISBN:
(数字)9783030372187
ISBN:
(纸本)9783030372187;9783030372170
In the 2019 editions of SIR, QS, ARWU and Webometric university rankings, after the process of evaluating and positioning through academic and research quality criteria established in their methodologies, 22 Latin American university institutions located in Brazil, Mexico, Chile, Argentina, and Colombia coincide in their positions in all the rankings considered for the study. This paper intends to characterize the website main menu design of these universities to describe and enlist the information available to users as an alternative to make their academic and scientific processes visible. Results highlight that 18% of the options of the main menu refer to library, academic life, institutional mail services, language translator, search engine, and information to visitors.
暂无评论