This paper introduces the innovative concept of the Cubixel—a three-dimensional representation of the traditional pixel—alongside the derived metric, Volume of the Void (VoV), which measures spatial disparities with...
详细信息
This paper investigates the capabilities of ChatGPT as an automated assistant in diverse domains,including scientific writing,mathematics,education,programming,and *** explore the potential of ChatGPT to enhance produ...
详细信息
This paper investigates the capabilities of ChatGPT as an automated assistant in diverse domains,including scientific writing,mathematics,education,programming,and *** explore the potential of ChatGPT to enhance productivity,streamline problem-solving processes,and improve writing ***,we highlight the potential risks associated with excessive reliance on ChatGPT in these *** limitations encompass factors like incorrect and fictitious responses,inaccuracies in code,limited logical reasoning abilities,overconfidence,and critical ethical concerns of copyright and privacy *** outline areas and objectives where ChatGPT proves beneficial,applications where it should be used judiciously,and scenarios where its reliability may be *** light of observed limitations,and given that the tool's fundamental errors may pose a special challenge for non-experts,ChatGPT should be used with a strategic *** drawing from comprehensive experimental studies,we offer methods and flowcharts for effectively using *** recommendations emphasize iterative interaction with ChatGPT and independent verification of its *** the importance of utilizing ChatGPT judiciously and with expertise,we recommend its usage for experts who are well-versed in the respective domains.
A threshold k out of n, or (k, n), secret sharing with perfect security encodes a secret into n shadows for the n participants such that any k participants are capable of reconstructing the secret using their shadows,...
详细信息
The skin acts as an important barrier between the body and the external environment, playing a vital role as an organ. The application of deep learning in the medical field to solve various health problems has generat...
详细信息
Reduplication is a highly productive process in Bengali word formation, with significant implications for various natural language processing (NLP) applications, such as parts-of-speech tagging and sentiment analysis....
详细信息
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital *** the development of IoT devices,huge amounts of information,including users’private data,are *** ...
详细信息
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital *** the development of IoT devices,huge amounts of information,including users’private data,are *** systems face major security and data privacy challenges owing to their integral features such as scalability,resource constraints,and *** challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data,creating an attractive opportunity for *** address these challenges,artificial intelligence(AI)techniques,such as machine learning(ML)and deep learning(DL),are utilized to build an intrusion detection system(IDS)that helps to secure IoT *** learning(FL)is a decentralized technique that can help to improve information privacy and performance by training the IDS on discrete linked *** delivers an effectual tool to defend user confidentiality,mainly in the field of IoT,where IoT devices often obtain privacy-sensitive personal *** study develops a Privacy-Enhanced Federated Learning for Intrusion Detection using the Chameleon Swarm Algorithm and Artificial Intelligence(PEFLID-CSAAI)*** main aim of the PEFLID-CSAAI method is to recognize the existence of attack behavior in IoT ***,the PEFLIDCSAAI technique involves data preprocessing using Z-score normalization to transformthe input data into a beneficial ***,the PEFLID-CSAAI method uses the Osprey Optimization Algorithm(OOA)for the feature selection(FS)*** the classification of intrusion detection attacks,the Self-Attentive Variational Autoencoder(SA-VAE)technique can be ***,the Chameleon Swarm Algorithm(CSA)is applied for the hyperparameter finetuning process that is involved in the SA-VAE model.A wide range of experiments were conducted to validate the execution of the PEFLID-CSAAI *** simulated outcomes demonstrated that the PEFLID-CSAAI
Small UAVs pose security risks to sensitive areas and individuals due to their rapid movement and wide coverage capabilities. Effective monitoring necessitates the deployment of lightweight and energy-efficient survei...
详细信息
Local Binary Patterns (LBP) is one of many image features suitable for enhancing textures within an image. Despite its popularity, this feature as well as its variants actually still has some drawbacks: requiring the ...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement Engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data programme from NASA,Predictor Models in Software Engineering,and iTrust Electronic Health Care System.
Severe rainfall has seriously threatened human health and survival. Natural catastrophes such as floods, droughts, and many other natural disasters are caused by heavy rains, which people worldwide have to deal with t...
详细信息
暂无评论