Array signal processing is an important branch in the field of signal processing. It has been widely used in many military and national economic fields such as radar, communications, sonar, navigation, voice signal pr...
详细信息
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and an...
详细信息
ISBN:
(数字)9798350392166
ISBN:
(纸本)9798350392173
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and analyze data on their own making the best use of available resources and providing creative solutions for challenging issues. The impact of AI on productivity, data analysis, flexibility, and real-time decision- making in a variety of fields is examined in this paper. Focusing on academic settings, the paper considers ethical concerns surrounding AI-generated content. According to a survey, even though many students use ChatGPT for writing and research, worries about academic integrity and plagiarism still exist.
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
The report proposes a dynamic routing method for Self-healing Networks (ShN). The method takes into account the specific features of ShN. During routing, the flow of service information is reduced. The search for the ...
详细信息
In this paper, a Safety System-on-Chip based on the open-source RISC-V processor SweRV EH1 from Western Digital is presented. A hardware comparator concept is followed. The SSoC is implemented on a Xilinx FPGA system ...
详细信息
Speech is a natural way of communicating between human beings and as such, it triggers an interest of transforming it to a way of interaction with a computer as well. Once it is converted into a sequence of words, it ...
详细信息
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due to the impossibility of changing the image (such as medical data where high accuracy is required and the appearance of artifacts is unacceptable) or due to the presence of a higher distortion of the container. This algorithm is based on DWT, SVD and operations in the field by modulo 256. The software implementation of the algorithm was developed (using the Accord and *** libraries to implement DWT, SVD). The software implementation of the algorithm was tested. This algorithm has advantages in the form of normalization of the average error, but it needs further research to improve its performance.
The Matura exam is the final national examination that high school students in many countries must pass to be eligible for admission to a university. This paper discusses the key factors that have the most impact in p...
详细信息
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime plat...
详细信息
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime platform, Intel's open-source Java virtual machine. We introduced the optimization technologies for synchronization removal and object stack allocation, as well as the runtime deoptimization and compensation work. The deoptimization and compensation technologies are crucial for a practical Escape analysis in open world. We evaluated the runtime efficiency of the deoptimization and compensation work on benchmarks like SPECjbb2000 and SPECjvm98.
In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Vo...
In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Voting Algorithms, Dynamic Voting Strategies, Confidence Calibration, Adaptation through Meta-Features and Meta-Learning, which allow improving the voting procedure of the bagging meta-algorithm. Artificial data was generated as initial data, which complicates the classification task and contains an increased amount of noise. In the Google Collab environment, software models of algorithms have been developed, and their quality has been assessed. It was found that the use of the Ensemble pruning and Adaptation through Meta-Features algorithm is the most qualitative. In addition, the Ensemble pruning algorithm reduces the number of basic ensemble classifiers, and, as a result, increases the efficiency of computer system identification. Based on the results of the study, a method for identifying a computer system was proposed through the integrated use of a bagging classifier and an optimization procedure based on the Ensemble pruning algorithm.
暂无评论