In today's digital age, recommendation systems have become an important tool in many sectors, including education. This study presents a comprehensive bibliometric analysis of the literature related to recommendat...
详细信息
Perception module of Autonomous vehicles (AVs) are increasingly susceptible to be attacked, which exploit vulnerabilities in neural networks through adversarial inputs, thereby compromising the AI safety. Some researc...
Sleep is a vital component of every human being. Adequate restful and restorative sleep reenergizes the body, enhances overall health and psychological well-being. Sleep hygiene, chaotic lifestyles, disorder breathing...
详细信息
Optical skyrmions are quasi-particles with nontrivial topological textures, which hold potential applications in optical information processing, transmission, and storage. There are various three-dimensional physical ...
详细信息
Digital media triage is a main challenge that faces a digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator's time and enhance outcomes. Memory investiga...
详细信息
Anomaly detection in video data plays a crucial role in numerous applications, such as industrial monitoring and automated surveillance. This paper presents a novel method for video anomaly detection (VAD) using Gener...
详细信息
Matrix multiplication (MM) is pivotal in fields from deep learning to scientific computing, driving the quest for improved computational efficiency. Accelerating MM encompasses strategies like complexity reduction, pa...
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creat...
详细信息
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly...
详细信息
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly susceptible to cyber-attacks because of memory,processing,and communication *** traditional models are not adequate for accomplishing security in the IoT environment,the recent developments of deep learning(DL)models find *** study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection(HMFS-SDLCAD)*** major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT *** the preliminary stage,data pre-processing is carried out to transform the input data into useful *** addition,salp swarm optimization based on particle swarm optimization(SSOPSO)algorithm is used for feature selection ***,stacked bidirectional gated recurrent unit(SBiGRU)model is utilized for the identification and classification of ***,whale optimization algorithm(WOA)is employed for optimal hyperparameter optimization *** experimental analysis of the HMFS-SDLCAD model is validated using benchmark dataset and the results are assessed under several *** simulation outcomes pointed out the improvements of the HMFS-SDLCAD model over recent approaches.
暂无评论