The earthquake early warning(EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is ...
详细信息
The earthquake early warning(EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is extracted using the primary wave earthquake precursor signal and site-specific *** Japan's earthquake magnitude dataset, there is a chance of a high imbalance concerning the earthquakes above strong impact. This imbalance causes a high prediction error while training advanced machine learning or deep learning models. In this work, Conditional Tabular Generative Adversarial Networks(CTGAN), a deep machine learning tool, is utilized to learn the characteristics of the first arrival of earthquake P-waves and generate a synthetic dataset based on this information. The result obtained using actual and mixed(synthetic and actual) datasets will be used for training the stacked ensemble magnitude prediction model, MagPred, designed specifically for this study. There are 13295, 3989, and1710 records designated for training, testing, and validation. The mean absolute error of the test dataset for single station magnitude detection using early three, four, and five seconds of P wave are 0.41, 0.40,and 0.38 MJMA. The study demonstrates that the Generative Adversarial Networks(GANs) can provide a good result for single-station magnitude prediction. The study can be effective where less seismic data is available. The study shows that the machine learning method yields better magnitude detection results compared with the several regression models. The multi-station magnitude prediction study has been conducted on prominent Osaka, Off Fukushima, and Kumamoto earthquakes. Furthermore, to validate the performance of the model, an inter-region study has been performed on the earthquakes of the India or Nepal region. The study demonstrates that GANs can discover effective magnitude estimation compared with non-GAN-based methods. This has a high potential for wid
With the emergence of various techniques involved in deep learning the researchers of computer vision tends to focus on the strategies such as object recognition and segmentation of image. This has inclined to accompl...
详细信息
Cloud environments often exhibit varying levels of heterogeneity arising from the diverse characteristics of cloudlets and virtual machines. This research paper focuses on addressing this heterogeneity and proposes tw...
详细信息
A prevalent diabetic complication is Diabetic Retinopathy(DR),which can damage the retina’s veins,leading to a severe loss of *** treated in the early stage,it can help to prevent vision *** since its diagnosis takes...
详细信息
A prevalent diabetic complication is Diabetic Retinopathy(DR),which can damage the retina’s veins,leading to a severe loss of *** treated in the early stage,it can help to prevent vision *** since its diagnosis takes time and there is a shortage of ophthalmologists,patients suffer vision loss even before ***,early detection of DR is the necessity of the *** primary purpose of the work is to apply the data fusion/feature fusion technique,which combines more than one relevant feature to predict diabetic retinopathy at an early stage with greater *** procedures for diabetic retinopathy analysis are fundamental in taking care of these *** profound learning for parallel characterization has accomplished high approval exactness’s,multi-stage order results are less noteworthy,especially during beginning phase *** Connected Convolutional Networks are suggested to detect of Diabetic Retinopathy on retinal *** presented model is trained on a Diabetic Retinopathy Dataset having 3,662 images given by *** results suggest that the training accuracy of 93.51%0.98 precision,0.98 recall and 0.98 F1-score has been achieved through the best one out of the three models in the proposed *** same model is tested on 550 images of the Kaggle 2015 dataset where the proposed model was able to detect No DR images with 96%accuracy,Mild DR images with 90%accuracy,Moderate DR images with 89%accuracy,Severe DR images with 87%accuracy and Proliferative DR images with 93%accuracy.
E-learning environments represent digital platforms designed to facilitate online learning experiences. Recognizing the diverse learning preferences of individuals, the need for identifying and integrating multi-layer...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
The advent of autonomous vehicles has revolutionized the automotive industry, offering promising advancements in safety, efficiency, and mobility. To integrate these autonomous vehicles into our society seamlessly, it...
详细信息
The art of hiding secret text within an innocuous cover medium is steganography. Steganalysis is the counterpart of steganography which focuses on the detection and extraction of the secret text from the medium. Featu...
详细信息
ISBN:
(数字)9783031612985
ISBN:
(纸本)9783031612978
The art of hiding secret text within an innocuous cover medium is steganography. Steganalysis is the counterpart of steganography which focuses on the detection and extraction of the secret text from the medium. Feature engineering is the crucial field in Stegware Analysis which intends to identify more specific features, focusing on the accuracy and efficiency. Feature engineering is a process in Machine learning where the features of any dataset are selected and extracted for further use. Feature engineering is the process of extracting, transforming and selecting the most relevant features form the data that aids in discriminating between the stego and cover image. This is because, most of the time, the data will be in a raw format. Any ML model needs the data to be pre-processed and kept ready to train the model. Thus, from the pool of raw data, the required data needs to be selected and can be used in training the model. Further, the data at point needs to be extracted to get the precise data. The scope of the work is to identify the various feature engineering techniques available in practice and efficiently use them to achieve high accuracy and precision in the system. The survey focuses on the several feature selection and extraction techniques like filter method, wrapper method and embedded methods. Correlation being one of the feature selection methods is focused;while statistical moments computes the mean, variance and skewness of the feature. The extraction method holds the Computation of Invariants and other such. Comparative study is made on both the methods to understand the concepts with ease. The work starts by taking a sample from the dataset and few feature extraction techniques are applied on the same. Then the original image is compared with the extracted images with the view of histogram. The paper gives valuable insights into the effectiveness of different feature engineering techniques using the dataset and underscores the importance of featu
Recent days there are more and more accidents occurring in and around our cities. Additionally, people do not adhere to the government-mandated speed limits in different locations (for example, a school zone has a low...
详细信息
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal ...
详细信息
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal of this study, which is designed to prevent the deployment of fraudulent servers. Smart contract verification on the blockchain will be used to this end. The cloud assault must be prevented from accessing personal payment and card information. It is via the employment of cryptography methods that this concept of privacy reservation is made possible. The Boolean crossover depth first search (DFS) technique is used to encrypt data in the payment gateway protocol at its inception. When the hospital administrator solicits card data from patients or users, our innovative approach swiftly initiates data encryption using the DFS technique. This method meticulously traverses the data structure in a depth-first manner, employing Boolean operations to systematically encrypt sensitive information. Through this process, the patient's payment and card data undergo secure transformation, rendering it unreadable to unauthorized entities. Additionally, an authentication key is generated concurrently with the encryption process, enabling verification between the system and the user before any data transmission occurs. The integration of the DFS technique serves as a fundamental layer of defense against potential cloud-based attacks. Its application ensures the utmost protection of personal payment and card details throughout the transaction process, bolstering the security infrastructure of our proposed system. A comprehensive analysis comparing our approach with existing methods showcases the efficiency and reliability of our proposed system in terms of Execution Time (ms), Encryption Time (ms), Decryption Time (ms), and Memory (bits). This study aims to bridge the gap in transactional security, ensuring robust protection against unauthorized access and data breaches in
暂无评论