Jute is a vital agricultural commodity contributing significantly to the GDP of countries like Bangladesh, India, Myanmar, and China. However, because of its inaccuracy and slowness, its vulnerability to pest infestat...
详细信息
Massively deployed IoT devices require a lightweight design to reduce costs. However, this architecture inherently limits their security, increasing the risk of data breaches and tampering on a large scale. In this pa...
详细信息
The rise of innovative applications,like online gaming,smart healthcare,and Internet of Things(IoT)services,has increased demand for high data rates and seamless connectivity,posing challenges for Beyond 5G(B5G)*** is...
详细信息
The rise of innovative applications,like online gaming,smart healthcare,and Internet of Things(IoT)services,has increased demand for high data rates and seamless connectivity,posing challenges for Beyond 5G(B5G)*** is a need for cost-effective solutions to enhance spectral efficiency in densely populated areas,ensuring higher data rates and uninterrupted connectivity while minimizing *** Aerial Vehicles(UAVs)as Aerial Base Stations(ABSs)offer a promising and cost-effective solution to boost network capacity,especially during emergencies and high-data-rate ***,integrating UAVs into the B5G networks presents new challenges,including resource scarcity,energy efficiency,resource allocation,optimal power transmission control,and maximizing overall *** paper presents a UAV-assisted B5G communication system where UAVs act as ABSs,and introduces the Deep Reinforcement Learning(DRL)based Energy Efficient Resource Allocation(Deep-EERA)*** efficient DRL-based Deep Deterministic Policy Gradient(DDPG)mechanism is introduced for optimal resource allocation with the twin goals of energy efficiency and average throughput *** proposed Deep-EERA method learns optimal policies to conserve energy and enhance throughput within the dynamic and complex UAV-empowered B5G *** extensive simulations,we validate the performance of the proposed approach,demonstrating that it outperforms other baseline methods in energy efficiency and throughput maximization.
In today’s world of digital transformation in business, driven by rapid technological advancement, the use of electronic commerce and digital banking is ever increasing. In line with global trends, the Indian banking...
详细信息
ISBN:
(数字)9798331531195
ISBN:
(纸本)9798331531201
In today’s world of digital transformation in business, driven by rapid technological advancement, the use of electronic commerce and digital banking is ever increasing. In line with global trends, the Indian banking and financial sector is experiencing a major adoption of digital payments, be it smaller retail payments or high-value corporate payments. With the increasing use of online payments, money laundering, cyberattacks, and other fraudulent activities are increasing. The innovative use of technology by fraudsters, aided by dynamic and irregular patterns of fraudulent activities, poses additional challenges in identifying frauds with high accuracy. Hence, preventing financial fraud requires the implementation of secured payment systems and efficient fraud detection and monitoring *** study delves into analyzing the results of applying ensemble-based Machine Learning (ML) methods to digital payment transactions, aiming to enhance the accuracy of fraud detection. A recent study and review of the existing literature show better performance by the Decision Tree algorithm over other ML models. Taking this into account, we used the decision tree algorithm to further build tree-based ensemble models, namely Random Forest, Gradient Tree Boosting, AdaBoost, and XGBoost. We analyze seven evaluation metrics: Precision, Recall, F-score, Accuracy, Misclassification Error, Area Under the Receiver Operating Characteristic Curve, and Cohen Kappa score. The data sets used are the National Electronic Fund Transfer (NEFT) payment transactions. The results show encouraging scores in segregating valid and fraudulent transactions, and thereby suggest the use of tree-based ensemble models as an effective tool for continuous monitoring and early detection of fraudulent payment transactions.
Federated Class-Incremental Learning (FCIL) aims to design privacy-preserving collaborative training methods to continuously learn new classes from distributed datasets. In these scenarios, federated clients face the ...
详细信息
This proposed solution seeks to establish a secure framework for implementing Industrial Artificial Intelligence (AI) Security in the 21st century. As AI technology progresses through creative and innovative advanceme...
详细信息
ISBN:
(数字)9798350356755
ISBN:
(纸本)9798350356762
This proposed solution seeks to establish a secure framework for implementing Industrial Artificial Intelligence (AI) Security in the 21st century. As AI technology progresses through creative and innovative advancements, ensuring robust security and addressing system vulnerabilities is essential for maintaining trust among online users. The proposed framework will understand and prevent key security concerns, such as data privacy, algorithmic transparency, and resilience against cyber threats, to create a more secure environment for the future. AI is deeply integrated into sectors like finance, healthcare, and autonomous systems related to various industries in the 21st century. This framework seeks to balance innovation with security, fostering trust and reliability in AI-powered solutions for industries. Significant Observations are Growing Threat Landscape, Trust Gap in AI Adoption, Lack of Standardized Security Protocols. The Quantifying Results are Attack Resistance, Data Privacy Assurance, System Reliability Improvement, Enhanced User Trust and Adoption. Securing web applications is particularly challenging due to the difficulty in detecting and recognizing user behavior patterns that could signal a potential compromise or cyber threat. By adopting robust security protocols, this framework will facilitate the safe and ethical integration of AI into various online applications, fostering trust and driving innovation in AI-driven solutions.
Social media platforms serve as significant spaces for users to have conversations, discussions and express their opinions. However, anonymity provided to users on these platforms allows the spread of hate speech and ...
详细信息
ISBN:
(数字)9798331506995
ISBN:
(纸本)9798331507008
Social media platforms serve as significant spaces for users to have conversations, discussions and express their opinions. However, anonymity provided to users on these platforms allows the spread of hate speech and other offensive material. Due to the wide-ranging nature of these platforms, there is a critical need to automatically detect and report occurrences of hate speech. There are various detection methods, but many of them operate as black boxes, lacking interpretability and explainability by design. To address the lack of interpretability, this study explores the development of an interpretable framework to detect hate speech in Arabic using large language models (LLMs). The proposed approach combines advanced natural language processing techniques with interpretable machine learning methods to enhance understanding of model decisions. The experimental results demonstrate that the model achieves high accuracy while maintaining interpretability, enabling users to understand the reasoning behind the detections. The proposed method achieves an accuracy of 0.846%, with a precision of 0.843% and a recall of 0.846%, outperforming existing Arabic hate speech detection models. These results show the effectiveness of combining LLM with interpretability for this critical task, providing a reliable and transparent solution for automated moderation of harmful content.
Transformer models have revolutionized AI tasks, but their large size hinders real-world deployment on resource-constrained and latency-critical edge devices. While binarized Transformers offer a promising solution by...
详细信息
The aim of this research is to determine the accuracy of machine learning algorithms in identifying high-crime regions. Traditional methods of locating crime hotspots, such manual analysis, are challenging and prone t...
详细信息
ISBN:
(数字)9798331530389
ISBN:
(纸本)9798331530396
The aim of this research is to determine the accuracy of machine learning algorithms in identifying high-crime regions. Traditional methods of locating crime hotspots, such manual analysis, are challenging and prone to errors. Machine learning offers a more accurate and effective approach. The study procedure includes preprocessing, determining pertinent characteristics, and collecting crime data. A range of machine learning algorithms that predict the likelihood of crime in different places will be trained using this data. The performance of these models will be evaluated using the pertinent metrics. The expected outcomes include demonstrating the value of machine learning in identifying crime hotspots, identifying suitable algorithms, gaining a better understanding of the factors that lead to hotspots, and developing a practical tool for law enforcement. The goal of this research is to make society safer and more secure by utilizing machine learning. Law enforcement organizations may more effectively deploy resources, discourage criminal activity, and eventually lower crime rates by accurately and efficiently identifying high-crime areas.
To address the modality learning degeneration caused by modality imbalance, existing multimodal learning (MML) approaches primarily attempt to balance the optimization process of each modality from the perspective of ...
详细信息
暂无评论