Wireless sensor networks (WSNs) are normally conveyed in arbitrary regions with no security. The source area uncovers significant data about targets. In this paper, a plan dependent on the cloud utilising data publish...
详细信息
Effective monitoring of the environment over a large area will require mobilization of a considerable amount of information. Otherwise, the use of traditional methods will prove to be costly and would take up so much ...
详细信息
In vehicular networks, vehicles frequently broad-cast vehicle states information to track the movement of their neighbors. A large number of vehicles get access to the shared channel resources to broadcast their state...
详细信息
Electrocardiogram (ECG) signal classification is an important task in healthcare as it plays a vital role in early prevention and diagnosis of cardiovascular diseases. In this work, we propose an attention-based hybri...
详细信息
Simulation is crucial for autonomous driving technology evolution. Radar, as an essential sensor in this field, significantly influences decision-making with its outputs. High-fidelity autonomous driving simulations r...
详细信息
Simulation is crucial for autonomous driving technology evolution. Radar, as an essential sensor in this field, significantly influences decision-making with its outputs. High-fidelity autonomous driving simulations require radar models that replicate radar outputs, including false alarms, missed alarms, and measurement errors, both in real-time and with high fidelity. The radar detection process is highly complex, and false and miss alarms add significant uncertainty to the detection results. Current radar models cannot accurately predict radar outputs. To address these issues, this study introduces a data-driven radar modeling approach. Initially, an analysis of factors influencing radar detection outcomes was conducted. Then proposes a labeling method for radar output objects, identify the corresponding scene targets, and distinguish between ghost and real objects. Following this, it introduces a modeling technique that separates radar output status and parameters, aiming to accurately predict radar outputs in the presence of false and missed alarms. It further decouples output parameters to boost prediction accuracy. Radar data is then collected to create a dataset. The radar model is developed and validated against conventional models. The model achieves a 96.5% accuracy in predicting false and missed alarms, with its predictions for radar output parameters closely approximating actual values. Compared to traditional models, there are improvements exceeding 70.60% and 93.68% respectively. Its 5-millisecond processing speed is substantially faster than actual radar speeds. This demonstrates the method's ability to create high-fidelity, real-time models. IEEE
This study emphasizes the potential of chatbots in revolutionizing healthcare, particularly in the context of infectious disease management. While hospitals have long been the primary source of medical check-ups, diag...
详细信息
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more *** has been widely applied in various scenarios,including urban infrastructure,transportation,industry,...
详细信息
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more *** has been widely applied in various scenarios,including urban infrastructure,transportation,industry,personal life,and other socio-economic *** introduction of deep learning has brought new security challenges,like an increment in abnormal traffic,which threatens network *** feature extraction leads to less accurate classification *** abnormal traffic detection,the data of network traffic is high-dimensional and *** data not only increases the computational burden of model training but also makes information extraction more *** address these issues,this paper proposes an MD-MRD-ResNeXt model for abnormal network traffic *** fully utilize the multi-scale information in network traffic,a Multi-scale Dilated feature extraction(MD)block is *** module can effectively understand and process information at various scales and uses dilated convolution technology to significantly broaden the model’s receptive *** proposed Max-feature-map Residual with Dual-channel pooling(MRD)block integrates the maximum feature map with the residual *** module ensures the model focuses on key information,thereby optimizing computational efficiency and reducing unnecessary information *** results show that compared to the latest methods,the proposed abnormal traffic detection model improves accuracy by about 2%.
The process of identifying and categorizing lung cancer in its early stages is difficult, yet doing so will improve patient survival rates. There is a wealth of research that segments and categorizes lung nodules usin...
详细信息
With the vast advancements in Information technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation *** clone intends to replicate the users and...
详细信息
With the vast advancements in Information technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation *** clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original ***,the attackers also target this height of OSN utilization,explicitly creating the clones of the user’s *** clone detection mechanisms are designed based on social-network *** instance,monitoring the occur-rence of clone edges is done to restrict the generation of clone ***,this assumption is unsuitable for a real-time environment and works optimally during the simulation *** research concentrates on modeling and effi-cient clone prediction and avoidance methods to help the social network activists and the victims enhance the clone prediction *** model does not rely on ***,an ensemble Adaptive Random Subspace is used for clas-sifying the clone victims with k-Nearest Neighbour(k-NN)as a base classifi*** weighted clone nodes are analysed using the weighted graph theory concept based on the classified *** the weighted node’s threshold value is high-er,the trust establishment is terminated,and the clones are ranked and sorted in the higher place for ***,the victims are alert to the clone propaga-tion over the online social networking end,and the validation is done using the MATLAB 2020a simulation *** model shows a better trade-off than existing approaches like Random Forest(RF),Naïve Bayes(NB),and the standard graph *** performance metrics like True Positive Rate(TPR),False Alarm Rate(FAR),Recall,Precision,F-measure,and ROC and run time analysis are evaluated to show the significance of the model.
In vehicular networks, vehicle in the platooning relies on dissemination of beacons to perceive the status of neighbor vehicles and then take control low to maintain a constant inter-vehicle distance. Vehicle platooni...
详细信息
暂无评论