This paper develops a new meta-heuristic algorithm, called Membrane Algorithm based on Quasi-Affine TRansformation Evolution (MA-QUATRE). The proposed algorithm combines the principles of QUATRE, the one-level membran...
详细信息
In modern agriculture, the capability to promptly detect and respond to specific events is crucial. This study centres on the transformative potential of TinyML for enhancing event detection in Smart Agriculture, part...
详细信息
This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with ...
详细信息
ISBN:
(纸本)9781450398541
This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks.
A secure architecture of e-Health applications must be carefully approached to ensure confidentiality, integrity, and authenticity. A malicious attack or privacy breach can have serious consequences, according to the ...
详细信息
ISBN:
(数字)9798350385427
ISBN:
(纸本)9798350385434
A secure architecture of e-Health applications must be carefully approached to ensure confidentiality, integrity, and authenticity. A malicious attack or privacy breach can have serious consequences, according to the General Data Protection Regulation (GDPR). The security protocols and their cryptographic mechanisms that are commonly employed are often high resource and high execution demanding. Specifically, for the proper implementation of the key generation and the handshake protocol, various random values must be produced. This is ensured by Pseudo Random Number Generators (PRNGs) that must be compact with efficient security and verified randomness. In this paper, a compact pipelined architecture of the chaotic logistic map for e-Health applications is proposed. The proposed architecture presents a 10.82% area reduction and a 14% area delay reduction compared to other published related works. These results are achieved without the utilization of DSPs, an approach that is not followed by the other published works, while being verified by NIST tests.
Electric vehicles, or EVs, have drawn a lot of attention lately as an eco-friendly way to cut carbon emissions and lessen reliance on fossil fuels. This work uses a neural network model called Long Short-Term Memory (...
详细信息
ISBN:
(数字)9798331511166
ISBN:
(纸本)9798331511173
Electric vehicles, or EVs, have drawn a lot of attention lately as an eco-friendly way to cut carbon emissions and lessen reliance on fossil fuels. This work uses a neural network model called Long Short-Term Memory (LSTM), which is effective at processing sequential input, to analyze user attitudes toward electric vehicles. Opinion data were gathered from the social media network Twitter between March 1st and March 31st, 2023, using the keyword “electric vehicles”. Based on the obtained opinion data, the LSTM approach is utilized to categorize sentiments as positive or negative. Implementation of the random oversampling technique is important to be applied in increasing the accuracy of the $\mathbf{n}$ recall model for the specified class. The study's conclusions show that the LSTM model performs admirably when it comes to sentiment analysis using the test dataset. The model evaluation yields a precision of $\mathbf{99.65 \%}$ and an accuracy rating of $\mathbf{97.79 \%}$ . The modeling process is carried out with variance splitting data where the highest accuracy is obtained from a comparison of training testing data of $\mathbf{90 \%}$ : $\mathbf{10 \%}$ .
Integrated sensing and communications (ISAC) are envisioned to be an integral part of future wireless networks, especially when operating at the millimeter-wave (mm-wave) and terahertz (THz) frequency bands. However, ...
详细信息
Service composition in Internet of Things (SCIoT), as an emerging topic in service computing, aims to select optimal services to complete user requests according to various user requirements such as minimizing energy ...
详细信息
This study aims to build live texturing augmented reality to enhance the attractiveness of coloring books. This research has four main stages, namely data gathering, object preparations, software development and evalu...
详细信息
Stereotypes constitute a widely used technique for creating user models. This paper explores the potential of stereotype-based models in virtual environments in order to enhance user engagement and learning outcomes. ...
Stereotypes constitute a widely used technique for creating user models. This paper explores the potential of stereotype-based models in virtual environments in order to enhance user engagement and learning outcomes. The focus is on an application, named Beekeeper World, which employs adaptive scenarios that respond to user actions. These scenarios, referred to as stereotype user models, represent predefined behavior patterns that Beekeeper World uses to respond to specific user actions. In the game context, these stereotypes are triggered by particular player interactions involving the ecological dynamics of bees and spiders. The first one challenges the player when s/he fails to protect a bee by strengthening the enemy spider. The second stereotype is a way of helping the player by pausing the spiders' spawning when s/he cannot defend the bees. These stereotypes can be instrumental in creating predictable, consistent behavior in Beekeeper World. They provide a framework for the system to respond to various user inputs in a consistent manner. This consistency can be crucial in maintaining the desired user engagement, as it ensures that the system's responses align with the user's expectations based on their previous interactions. Furthermore, these stereotypes can contribute to the complexity and challenge of the game, as they require the player to understand and adapt to these patterns in order to succeed, thereby promoting strategic thinking and problem-solving skills.
The challenging deployment of Artificial Intelligence (AI) and computer Vision (CV) algorithms at the edge pushes the community of embedded computing to examine heterogeneous System-on-Chips (SoCs). Such novel computi...
详细信息
暂无评论