Machine uptime is highly important as the repairing time takes longer which affects the production and the manufacturing industry focus on new ways of being competitive. Manufacturing and assembly parts of the machine...
详细信息
In this research, a novel multilevel inverter is introduced that aims to enhance voltage and power quality by minimizing the number of switches needed at certain voltage levels. The recommended inverter incorporates p...
详细信息
We present an embedded Spiking Neural Network (SNN) in a Field-Programmable Gate Array (FPGA) for retinal prosthetic applications. Our primary goal is to minimize resource utilization, making the solution suitable for...
详细信息
Source camera identification has emerged as a vital solution to unlock incidents involving critical cases like terrorism, violence, and other criminal activities. The ability to trace the origin of an image/video can ...
详细信息
a botnet is a group of devices which are controlled by the Attacker and used for fraud, scam and *** attacker is also known as *** Bots are used to conduct many activities varies from stealing user credentials, sendin...
详细信息
With intelligent terminal devices’widespread adoption and global positioning systems’advancement,Location-based Social Networking Services(LbSNs)have gained considerable *** recommendation mechanism,which revolves a...
详细信息
With intelligent terminal devices’widespread adoption and global positioning systems’advancement,Location-based Social Networking Services(LbSNs)have gained considerable *** recommendation mechanism,which revolves around identifying similar users,holds significant importance in *** order to enhance user experience,LbSNs heavily rely on accurate *** mining and analyzing users who exhibit similar behavioral patterns to the target user,LbSNs can offer personalized services that cater to individual ***,trajectory data,a form encompassing various sensitive attributes,pose privacy *** disclosure of users’precise trajectory information can have severe consequences,potentially impacting their daily ***,this paper proposes the Similar User Discovery Method based on Semantic Privacy(SUDM-SP)for trajectory *** approach involves employing a model that generates noise trajectories,maximizing expected noise to preserve the privacy of the original *** users are then identified based on the published noise trajectory ***-SP consists of two key ***,a puppet noise location,exhibiting the highest semantic expectation with the original location,is generated to derive noisesuppressed trajectory ***,a mechanism based on semantic and geographical distance is employed to cluster highly similar users into communities,facilitating the discovery of noise trajectory similarity among *** trials conducted using real datasets,the effectiveness of SUDM-SP,as a recommendation service ensuring user privacy protection is substantiated.
This survey seeks to give a general overview of the current state of Tea Plant disease prediction for the Blister Blight disease. To construct this system, IoT and machine learning approaches are applied. The goal of ...
详细信息
This research paper presents a comprehensive case study conducted in a superstore, introducing a novel gold membership offer and employing sophisticated analytics and machine learning methodologies to identify potenti...
详细信息
In the realm of the Internet of Vehicles (IoV), this study addresses a fundamental question that causes the emerging trends within the IoV landscape, Previous research in IoV has laid the groundwork but is limited by ...
详细信息
Efficient waste control is critical for India's smart cities. This study uses Convolutional Neural network (CNN) technology to classify and reveal waste, integrating sensors, Internet of Things (IoT) gadgets, and ...
详细信息
暂无评论