Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** di...
详细信息
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** diversity of reaction types available on Facebook(namely FB)enables users to express their feelings,and its traceability creates and enriches the users’emotional identity in the virtual *** paper is based on the analysis of 119875012 FB reactions(Like,Love,Haha,Wow,Sad,Angry,Thankful,and Pride)made at multiple levels(publications,comments,and sub-comments)to study and classify the users’emotional behavior,visualize the distribution of different types of reactions,and analyze the gender impact on emotion *** of these can be achieved by addressing these research questions:who reacts the most?Which emotion is the most expressed?
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affect...
详细信息
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affected by the block ***,it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems,especially in wireless environments involving *** paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during *** our scheme,using a friendly jamming UAV to emit jamming signals diminishes the quality of the eavesdropping channel,thus enhancing the communication security performance of the source *** the constraints of maneuverability and transmission power of the UAV,the joint design of UAV trajectories,transmission power,and block length are proposed to maximize the average minimum secrecy rate(AMSR).Since the optimization problem is non-convex and difficult to solve directly,we first decompose the optimization problem into subproblems of trajectory optimization,transmission power optimization,and block length ***,based on firstorder approximation techniques,these subproblems are reformulated as convex optimization ***,we utilize an alternating iteration algorithm based on the successive convex approximation(SCA)technique to solve these subproblems *** simulation results demonstrate that our proposed scheme can achieve secure transmission for blocks while maintaining the performance of the blockchain.
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce th...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical ***,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of ***,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical ***,we envision open issues and challenges of the Metaverse in the technical *** work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
Frauds don’t follow any recurring *** require the use of unsupervised learning since their behaviour is continually ***-sters have access to the most recent technology,which gives them the ability to defraud people t...
详细信息
Frauds don’t follow any recurring *** require the use of unsupervised learning since their behaviour is continually ***-sters have access to the most recent technology,which gives them the ability to defraud people through online *** make assumptions about consumers’routine behaviour,and fraud develops *** learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other *** a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization pat-terns with a focus on fraud situations that cannot be identified using historical data or supervised learning is the aim of this paper Artificial Bee Colony(ABC).Using real-time data and other datasets that are readily available,the ABC-Recurrent Neural Network(RNN)categorizes fraud behaviour and compares it to the current *** compared to the current approach,the findings demonstrate that the accuracy is high and the training error is minimal in ABC_*** this paper,we measure the Accuracy,F1 score,Mean Square Error(MSE)and Mean Absolute Error(MAE).Our system achieves 97%accuracy,92%precision rate and F1 score 97%.Also we compare the simulation results with existing methods.
To manage the huge data, cloud computing necessitates a significant number of disc I/O, network bandwidth and CPU cycles. To handle the massive volumes of data, the programming paradigm known as data flow integrates t...
详细信息
The kidney is an important organ of humans to purify the *** healthy function of the kidney is always essential to balance the salt,potassium and pH levels in the ***,the failure of kidneys happens easily to human bei...
详细信息
The kidney is an important organ of humans to purify the *** healthy function of the kidney is always essential to balance the salt,potassium and pH levels in the ***,the failure of kidneys happens easily to human beings due to their lifestyle,eating habits and diabetes *** pre-diction of kidney stones is compulsory for timely *** processing-based diagnosis approaches provide a greater success rate than other detection *** this work,proposed a kidney stone classification method based on optimized Transfer Learning(TL).The Deep Convolutional Neural Network(DCNN)models of DenseNet169,MobileNetv2 and GoogleNet applied for clas-sifi*** combined classification results are processed by ensemble learning to increase classification *** hyperparameters of the DCNN model are adjusted by the metaheuristic algorithm of Gorilla Troops Optimizer(GTO).The proposed TL model outperforms in terms of all the parameters compared to other DCNN models.
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial *** factors such as weather,soil...
详细信息
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial *** factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision *** radial basis function network has been used for irrigation ***,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision *** handle the above mentioned issues,an efficient method for irrigation prediction is used in this *** factors considered for decision making are soil moisture,temperature,plant height,root *** above-mentioned data will be gathered from the sensors that are attached to the *** data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the *** the data stored in the cloud will be decrypted key before being given to the deci-sion-making ***,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking *** decision regarding the level of water required for cropfields would be *** on this outcome,the water volve opening duration and the level of fertilizers required will be *** results demons
Automatic emotion identification from speech is a difficult problem that significantly depends on the accuracy of the speech characteristics employed for categorization. The display of emotions seen in human speech is...
详细信息
Automatic emotion identification from speech is a difficult problem that significantly depends on the accuracy of the speech characteristics employed for categorization. The display of emotions seen in human speech is inherently integrated with hidden representations of several dimensions and the fundamentals of human behaviour. This illustrates the significance of using auditory data gathered from discussions between people to determine people's emotions. In order to engage with people more closely, next-generation artificial intelligence will need to be able to recognize and express emotional states. Even though recovery of emotions from verbal descriptions of human interactions has shown promising outcomes, the accuracy of auditory feature-based emotion recognition from speech is still lacking. This paper suggests a unique method for Speech-based Emotion Recognition (SER) that makes use of Improved and a Faster Region-based Convolutional Neural Network (IFR-CNN). IFR-CNN employs Improved Intersection over Unification (IIOU) in the positioning stage with better loss function for improving Regions of Interest (RoI). With the help of a Recurrent Neural Network (RNN)-based model that considers both the dialogue structure and the unique emotional states;modern categorical emotion forecasts may be created quickly. In particular, IFR-CNN was developed to learn and store affective states, as well as track and recover speech properties. The effectiveness of the proposed method is evaluated with the help of real-time prediction capabilities, empirical evaluation, and benchmark datasets. From the speech dataset, we have extracted the Mel frequency cepstral coefficients (MFCC), as well as spectral characteristics and temporal features. Emotion recognition using retrieved information is the goal of the IFR-development. Quantitative analysis on two datasets, the Berlin Database of Emotional Speech (EMODB) and the Serbian Emotional Speech Database (GEES), revealed encouraging r
The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification *** to its importance,numerous studies have been conducted in various...
详细信息
The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification *** to its importance,numerous studies have been conducted in various *** have established several learning methods for writer identification including supervised and unsupervised ***,supervised methods require a large amount of annotation data,which is impossible in most *** the other hand,unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be *** paper introduces an unsupervised writer identification system that analyzes the data and recognizes the writer based on the inter-feature relations of the data to resolve the uncertainty of the features.A pairwise architecturebased Autoembedder was applied to generate clusterable embeddings for handwritten text ***,the trained baseline architecture generates the embedding of the data image,and the K-means algorithm is used to distinguish the embedding of individual *** proposed model utilized the IAM dataset for the experiment as it is inconsistent with contributions from the authors but is easily accessible for writer identification *** addition,traditional evaluation metrics are used in the proposed ***,the proposed model is compared with a few unsupervised models,and it outperformed the state-of-the-art deep convolutional architectures in recognizing writers based on unlabeled data.
暂无评论