Various scholars have investigated Fibonacci arrays to uncover its combinatorial features and applications. As an extension of Involutive Fibonacci words, Involutive Fibonacci arrays were introduced. We will look at s...
详细信息
The security of integrated circuits is crucial due to their wide range of applications in modern gadgets. An unauthorized access (i.e., third-party access) or a security breach in the logic-locked system can pose a gr...
详细信息
Creating infrastructures, virtual servers, computing resources, along with devices is termed virtualisation. In this methodology, to augment resource usage along with to mitigate the total power consumption, mapping o...
详细信息
This study introduces a deep learning method for automatically detecting bone fractures with the YOLOv8 object detection model, developed to aid radiologists in accurately and efficiently interpreting X-ray images. Th...
详细信息
Prediction of stock market value is highly risky because it is based on the concept of Time Series forecasting system that can be used for investments in a safe environment with minimized chances of *** proposed model...
详细信息
Prediction of stock market value is highly risky because it is based on the concept of Time Series forecasting system that can be used for investments in a safe environment with minimized chances of *** proposed model uses a real time dataset offifteen Stocks as input into the system and based on the data,predicts or forecast future stock prices of different companies belonging to different *** dataset includes approximatelyfifteen companies from different sectors and forecasts their results based on which the user can decide whether to invest in the particular company or not;the forecasting is done for the next *** model uses 3 main concepts for forecasting *** one is for stocks that show periodic change throughout the season,the‘Holt-Winters Triple Exponential Smoothing’.3 basic things taken into conclusion by this algorithm are Base Level,Trend Level and Seasoning *** value of all these are calculated by us and then decomposition of all these factors is done by the Holt-Winters *** second concept is‘Recurrent Neural Network’.The specific model of recurrent neural network that is being used is Long-Short Term Memory and it’s the same as the Normal Neural Network,the only difference is that each intermediate cell is a memory cell and retails its value till the next feedback *** third concept is Recommendation System whichfilters and predict the rating based on the different factors.
An intrusion detection system(IDS)becomes an important tool for ensuring security in the *** recent times,machine learning(ML)and deep learning(DL)models can be applied for the identification of intrusions over the ne...
详细信息
An intrusion detection system(IDS)becomes an important tool for ensuring security in the *** recent times,machine learning(ML)and deep learning(DL)models can be applied for the identification of intrusions over the network *** resolve the security issues,this paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique,called BBOFS-DRL for intrusion *** proposed BBOFSDRL model mainly accomplishes the recognition of intrusions in the *** attain this,the BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm(BOA)to elect feature ***,DRL model is employed for the proper identification and classification of intrusions that exist in the ***,beetle antenna search(BAS)technique is applied to tune the DRL parameters for enhanced intrusion detection *** ensuring the superior intrusion detection outcomes of the BBOFS-DRL model,a wide-ranging experimental analysis is performed against benchmark *** simulation results reported the supremacy of the BBOFS-DRL model over its recent state of art approaches.
In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique challenges due to their limited resources and diverse composition, high c...
详细信息
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acq...
详细信息
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acquisition and transmission phases,noise is introduced into the acquired image,which can have a negative impact on downstream analyses such as classification,target tracking,and spectral *** in hyperspectral images(HSI)is modelled as a combination from several sources,including Gaussian/impulse noise,stripes,and *** HSI restoration method for such a mixed noise model is ***,a joint optimisation framework is proposed for recovering hyperspectral data corrupted by mixed Gaussian-impulse noise by estimating both the clean data as well as the sparse/impulse noise ***,a hyper-Laplacian prior is used along both the spatial and spectral dimensions to express sparsity in clean image ***,to model the sparse nature of impulse noise,anℓ_(1)−norm over the impulse noise gradient is *** the proposed methodology employs two distinct priors,the authors refer to it as the hyperspectral dual prior(HySpDualP)*** the best of authors'knowledge,this joint optimisation framework is the first attempt in this *** handle the non-smooth and nonconvex nature of the generalℓ_(p)−norm-based regularisation term,a generalised shrinkage/thresholding(GST)solver is ***,an efficient split-Bregman approach is used to solve the resulting optimisation *** results on synthetic data and real HSI datacube obtained from hyperspectral sensors demonstrate that the authors’proposed model outperforms state-of-the-art methods,both visually and in terms of various image quality assessment metrics.
Latent Lip groove application is been a notable topic in forensic applications like crime and other investigations. The detection of lip movement is been a challenging task since it is a smaller integral part of the h...
详细信息
In an infrastructure cloud environment, task scheduling should focus on optimizing execution time and saving energy. The data center consumes a large amount of energy during the execution of the task. Energy-saving te...
详细信息
暂无评论