We consider a setting in which N agents aim to speedup a common Stochastic Approximation (SA) problem by acting in parallel and communicating with a central server. We assume that the up-link transmissions to the serv...
详细信息
The recent Internet of Things (IoT) adoption has revolutionized various applications while introducing significant security and privacy challenges. Traditional security solutions are unsuitable for IoT systems due to ...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have made progress,a common challenge is the low accuracy of existing detection *** models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource *** proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and *** leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial *** advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the *** results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these *** CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies.
Two-dimensional (2D) simultaneous localization and mapping (SLAM) using a LIDAR is a method used to track the position and orientation of a moving platform. 2D-SLAM assumes that the platform translates in a 2D plane a...
详细信息
The N-body problem in classical physics, is the calculation of force ofgravitational attraction of heavenly bodies towards each other. Solving this problem for many heavenly bodies has always posed a challenge to phy...
详细信息
The N-body problem in classical physics, is the calculation of force ofgravitational attraction of heavenly bodies towards each other. Solving this problem for many heavenly bodies has always posed a challenge to physicists andmathematicians. Large number of bodies, huge masses, long distances and exponentially increasing number of equations of motion of the bodies have been themajor hurdles in solving this problem for large and complex galaxies. Adventof high performance computational machines have mitigated the problem to muchextent, but still for large number of bodies it consumes huge amount of resourcesand days for computation. Conventional algorithms have been able to reduce thecomputational complexity from O n2 ð Þ to O nlogn ð Þ by splitting the space into atree or mesh network, researchers are still looking for improvements. In thisresearch work we propose a novel solution to N-body problem inspired by metaheuristics algorithms. The proposed algorithm is simulated for various time periods of selected heavenly bodies and analyzed for speed and accuracy. Theresults are compared with that of conventional algorithms. The outcomes showabout 50% time saving with almost no loss in accuracy. The proposed approachbeing a metaheuristics optimization technique, attempts to find optimal solution tothe problem, searching the entire space in a unique and efficient manner in a verylimited amount of time.
A brain tumor is the uncharacteristic progression of tissues in the *** are very deadly,and if it is not diagnosed at an early stage,it might shorten the affected patient’s life ***,their classification and detection...
详细信息
A brain tumor is the uncharacteristic progression of tissues in the *** are very deadly,and if it is not diagnosed at an early stage,it might shorten the affected patient’s life ***,their classification and detection play a critical role in *** Brain tumor detection is done by biopsy which is quite *** is usually not preferred at an early stage of the *** detection involvesMagneticResonance Imaging(MRI),which is essential for evaluating the *** paper aims to identify and detect brain tumors based on their location in the *** order to achieve this,the paper proposes a model that uses an extended deep Convolutional Neural Network(CNN)named Contour Extraction based Extended EfficientNet-B0(CE-EEN-B0)which is a feed-forward neural network with the efficient net layers;three convolutional layers and max-pooling layers;and finally,the global average pooling *** site of tumors in the brain is one feature that determines its effect on the functioning of an ***,this CNN architecture classifies brain tumors into four categories:No tumor,Pituitary tumor,Meningioma tumor,andGlioma *** network provides an accuracy of 97.24%,a precision of 96.65%,and an F1 score of 96.86%which is better than already existing pre-trained networks and aims to help health professionals to cross-diagnose an MRI *** model will undoubtedly reduce the complications in detection and aid radiologists without taking invasive steps.
Illegal logging causes widespread deforestation. Global consequences. Controlling when, where, and how illegal actions occur would help protect trees and decrease deforestation. Because people don't know this, ill...
详细信息
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vecto...
详细信息
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vector (AODV), routes are created only when there is an actual data transmission requirement. In contrast, proactive routing protocols maintain pre-computed paths to all potential destinations, resulting in reduced resource utilization within reactive protocols and continuous route maintenance within proactive ones. Reactive routing protocols are resource efficient as they establish routes as needed, while proactive counterparts maintain routing tables for all possible destinations, ensuring constant route availability regardless of data transmission demands. This paper primarily concentrates on the reactive routing protocol category, focusing on real-time path optimization and routing information updates. In the context of Vehicular Internet of Things (VIoT) networks, where malicious entities might attempt to flood, mislead, or impersonate routing packets, it is imperative to ensure robust security measures within the routing protocol. Unfortunately, secure routing protocols in VIoT networks, including AODV, SAODV, and SGHRP, often exhibit inefficiencies and impose a high overhead. To address these challenges, this research paper introduces the Security Metrics and Authentication-based RouTing (SMART) protocol for VIoT networks, with a focus on enhancing security while minimizing overhead. The SMART protocol utilizes the Merkle tree for hash (digest) generation, which is then encrypted using Elliptic Curve Cryptography (ECC) to reduce overhead. This proposed protocol enhances security by authenticating the source and incorporating security metrics into the routing information. To assess the performance of the SMART protocol, simulations were conducted using Network Simulator-2 (NS2). The results demonstrated an improved packet delivery ratio, red
Automatic road anomaly detection and recognition systems are essential due to their effect on the comfort and safety of drivers and passengers. Drivers should be aware of bad road conditions and the existence of anoma...
详细信息
We consider word-of-mouth social learning involving m Kalman filter agents that operate sequentially. The first Kalman filter receives the raw observations, while each subsequent Kalman filter receives a noisy measure...
详细信息
暂无评论