A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually *** enrich the services in mobile communications,developers have combined Web ...
详细信息
A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually *** enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a *** emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of *** a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage ***,the question of how to determine the most suitable mashups from big data has become a challenging *** this paper,we propose a mashup recommendation framework from big data in mobile networks and the *** proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix *** employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the *** also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization *** then crawl through a real-world large mashup dataset and perform *** experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s *** exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and *** the time of the attack,it appears the women were immobilized and needed immediate *** self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or *** proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud *** is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud *** can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location *** has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 *** average activation time is 2.079 s.
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can ha...
详细信息
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can hamper the performance of IoT-enabled cloud ***,efficient task scheduling can lower the cloud infrastructure’s energy consumption,thus maximizing the service provider’s revenue by decreasing user job processing *** proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm(MCWOA),combines elements of the Chimp Optimization Algorithm(COA)and the Whale Optimization Algorithm(WOA).To enhance MCWOA’s identification precision,the Sobol sequence is used in the population initialization phase,ensuring an even distribution of the population across the solution ***,the traditional MCWOA’s local search capabilities are augmented by incorporating the whale optimization algorithm’s bubble-net hunting and random search mechanisms into MCWOA’s position-updating *** study demonstrates the effectiveness of the proposed approach using a two-story rigid frame and a simply supported beam *** outcomes reveal that the new method outperforms the original MCWOA,especially in multi-damage detection *** excels in avoiding false positives and enhancing computational speed,making it an optimal choice for structural damage *** efficiency of the proposed MCWOA is assessed against metrics such as energy usage,computational expense,task duration,and *** simulated data indicates that the new MCWOA outpaces other methods across all *** study also references the Whale Optimization Algorithm(WOA),Chimp Algorithm(CA),Ant Lion Optimizer(ALO),Genetic Algorithm(GA)and Grey Wolf Optimizer(GWO).
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on e...
详细信息
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on encryption algorithms,which are shared database technologies on the *** technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent *** nodes in the blockchain network are used to verify online ***,this integration creates scalability,interoperability,and security *** the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and *** technology helps IoT networks become more reliable and enhance security and *** also removes single points of failure and lowers the *** recent years,there has been an increasing amount of literature on IoT and blockchain technology *** paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of ***,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into *** survey examined various research papers fromdifferent types of ***,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based *** research directions are gathered for the effective integration of Blockchain and IoT.
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is...
详细信息
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is *** convolutional neural networks,renowned for their independence in feature extraction,have established their value in numerous detection and classification ***,it requires large training datasets and several parameters that need careful *** proposed Modified Dense Convolutional Network(MDCN)provides a successful classification scheme for plant diseases affecting mango *** model employs the strength of pre-trained networks and modifies them for the particular context of mango leaf diseases by incorporating transfer learning *** data loader also builds mini-batches for training the models to reduce training ***,optimization approaches help increase the overall model’s efficiency and lower computing *** employed on the MangoLeafBD Dataset consists of a total of 4,000 *** the experimental results,the proposed system is compared with existing techniques and it is clear that the proposed algorithm surpasses the existing algorithms by achieving high performance and overall throughput.
This article is an extended abstract of the doctoral dissertation entitled "Tailoring security-related software and training requirements to users based on their categorization" [1]. Security has traditional...
详细信息
Prior efforts in light-weight model development mainly centered on CNN and Transformer-based designs yet faced persistent challenges. CNNs adept at local feature extraction compromise resolution while Transformers off...
详细信息
The Internet of things(IoT)is a wireless network designed to perform specific tasks and plays a crucial role in various fields such as environmental monitoring,surveillance,and *** address the limitations imposed by i...
详细信息
The Internet of things(IoT)is a wireless network designed to perform specific tasks and plays a crucial role in various fields such as environmental monitoring,surveillance,and *** address the limitations imposed by inadequate resources,energy,and network scalability,this type of network relies heavily on data aggregation and clustering *** various conventional studies have aimed to enhance the lifespan of a network through robust systems,they do not always provide optimal efficiency for real-time *** paper presents an approach based on state-of-the-art machine-learning *** this study,we employed a novel approach that combines an extended version of principal component analysis(PCA)and a reinforcement learning algorithm to achieve efficient clustering and data *** primary objectives of this study are to enhance the service life of a network,reduce energy usage,and improve data aggregation *** evaluated the proposed methodology using data collected from sensors deployed in agricultural fields for crop *** proposed approach(PQL)was compared to previous studies that utilized adaptive Q-learning(AQL)and regional energy-aware clustering(REAC).Our study outperformed in terms of both network longevity and energy consumption and established a fault-tolerant network.
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv...
详细信息
Existing deep clustering approaches often struggle with redundant feature learning, which limits their effectiveness. The primary goal of this study is to address these issues by developing a more robust deep clusteri...
详细信息
暂无评论