Reducing a node’s power consumption is a difficult task for extending the network’s lifetime because the nodes are resource-constrained (i.e., limited battery power, processing capacity, storage, and non-rechargeabl...
详细信息
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser...
详细信息
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such services utilizing GPS through our ***,when users utilize these services,they inevitably expose personal information such as their ID and sensitive location to the *** to untrustworthy servers and malicious attackers with colossal background knowledge,users'personal information is at risk on these ***,many privacy-preserving solutions for protecting trajectories have significantly decreased utility after *** have come up with a new trajectory privacy protection solution that contraposes the area of interest for ***,Staying Points Detection Method based on Temporal-Spatial Restrictions(SPDM-TSR)is an interest area mining method based on temporal-spatial restrictions,which can clearly distinguish between staying and moving ***,our privacy protection mechanism focuses on the user's areas of interest rather than the entire ***,our proposed mechanism does not rely on third-party service providers and the attackers'background knowledge *** test our models on real datasets,and the results indicate that our proposed algorithm can provide a high standard privacy guarantee as well as data availability.
This paper improves the ill-condition of bone-conducted (BC) speech signal by reducing the eigenvalue expansion. BC speech commonly contains a large spectral dynamic range that causes ill-condition for the classical l...
详细信息
This paper addresses the challenge of computationally efficient similarity calculations between diverse hotel occupancy time series. The volume of data generated daily by the hospitality industry introduces challenges...
详细信息
Diabetes has become one of the significant reasons for public sickness and death in worldwide. By 2019, diabetes had affected more than 463 million people worldwide. According to the International Diabetes Federation ...
详细信息
Image captioning is the task of generating descriptive text for a given image, and there are two primary approchaes: fully supervised learning and text-only training. While the fully supervised approach sufferes from ...
详细信息
The agricultural sector contributes significantly to greenhouse gas emissions, which cause global warming and climate change. Numerous mathematical models have been developed to predict the greenhouse gas emissions fr...
详细信息
Advancements in Natural Language Processing and Deep Learning techniques have significantly pro-pelled the automation of Legal Judgment Prediction,achieving remarkable progress in legal *** of the existing research wo...
详细信息
Advancements in Natural Language Processing and Deep Learning techniques have significantly pro-pelled the automation of Legal Judgment Prediction,achieving remarkable progress in legal *** of the existing research works on Legal Judgment Prediction(LJP)use traditional optimization algorithms in deep learning techniques falling into local *** research article focuses on using the modified Pelican Optimization method which mimics the collective behavior of Pelicans in the exploration and exploitation phase during cooperative food ***,the selection of search agents within a boundary is done randomly,which increases the time required to achieve global *** address this,the proposed Chaotic Opposition Learning-based Pelican Optimization(COLPO)method incorporates the concept of Opposition-Based Learning combined with a chaotic cubic function,enabling deterministic selection of random numbers and reducing the number of iterations needed to reach global ***,the LJP approach in this work uses improved semantic similarity and entropy features to train a hybrid classifier combining Bi-GRU and Deep *** output scores are fused using improved score level fusion to boost prediction *** proposed COLPO method experiments with real-time Madras High Court criminal cases(Dataset 1)and the Supreme Court of India database(Dataset 2),and its performance is compared with nature-inspired algorithms such as Sparrow Search Algorithm(SSA),COOT,Spider Monkey Optimization(SMO),Pelican Optimization Algorithm(POA),as well as baseline classifier models and transformer neural *** results show that the proposed hybrid classifier with COLPO outperforms other cutting-edge LJP algorithms achieving 93.4%and 94.24%accuracy,respectively.
Weather variability significantly impacts crop yield, posing challenges for large-scale agricultural operations. This study introduces a deep learning-based approach to enhance crop yield prediction accuracy. A Multi-...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injec...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for *** overcome these obstacles,researchers have created several network IDS models,such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning *** study provides an updated learning strategy for artificial neural network(ANN)to address data categorization problems caused by unbalanced *** to traditional approaches,the augmented ANN’s 92%accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity,brought about by the addition of a random weight and standard *** the ever-evolving nature of cybersecurity threats,this study introduces a revolutionary intrusion detection method.
暂无评论