Recommendation systems are going to be an integral part of any E-Business in near *** in any other E-business,recommendation systems also play a key role in the travel business where the user has to be recommended wit...
详细信息
Recommendation systems are going to be an integral part of any E-Business in near *** in any other E-business,recommendation systems also play a key role in the travel business where the user has to be recommended with a restaurant that best suits *** general,the recommendations to a user are made based on similarity that exists between the intended user and the other *** similarity can be calculated either based on the similarity between the user profiles or the similarity between the ratings made by the *** phase of this work concentrates on experimentally analyzing both these models and get a deep insight of these *** the lessons learned from the insights,second phase of the work concentrates on developing a deep learning *** model does not depend on the other user's profile or rating made by *** model is tested with a small restaurant dataset and the model can predict whether a user likes the restaurant or *** model is trained with different users and their *** system learns from it and in order to predict whether a new user likes or not a restaurant that he/she has not visited earlier,all the data the trained model needed is the rating made by the same user for different *** model is deployed in a cloud environment in order to extend it to be more realistic product in *** evaluated with dataset,it achieves 74.6%is accurate prediction of results,where as existing techniques achieves only 64%.
In this study, the researchers investigate the mutually beneficial relationship that exists between machine learning (ML) and big data, highlighting both the benefits and the challenges that are brought about by the c...
详细信息
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this...
详细信息
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this paper investigates the energy efficiency(EE)maximization problem for downlink cooperative non-orthogonal multiple access(C-NOMA)systems with hardware impairments(HIs).The base station(BS)communicates with several users via a half-duplex(HD)amplified-and-forward(AF)***,we formulate the EE maximization problem of the system under HIs by jointly optimizing transmit power and power allocated coefficient(PAC)at BS,and transmit power at the *** original EE maximization problem is a non-convex problem,which is challenging to give the optimal solution ***,we use fractional programming to convert the EE maximization problem as a series of subtraction form ***,variable substitution and block coordinate descent(BCD)method are used to handle the ***,a resource allocation algorithm is proposed to maximize the EE of the ***,simulation results show that the proposed algorithm outperforms the downlink cooperative orthogonal multiple access(C-OMA)scheme.
This research paper is based on the issue of protecting the sensor networks in the era of IoT because the data is very sensitive and huge, and is collected in resource-constrained environments. We put forward a new ap...
详细信息
In Energy Harvesting Wireless Sensor Networks(EHWSN),the communication protocol will directly affect the final performance of the network,so it is necessary to study the communication protocol based on *** this paper,...
详细信息
In Energy Harvesting Wireless Sensor Networks(EHWSN),the communication protocol will directly affect the final performance of the network,so it is necessary to study the communication protocol based on *** this paper,for the low-cost fixed clustering problem,a fixed clustering protocol RRCEH is based on random *** proposed RRCEH abandons the inefficient inter-cluster communication method of the traditional fixed clustering *** coordinate the data upload of the cluster head,RRCEH allocates different random relay vectors to each ring area of the network,and combines all the random relay vectors into a random relay matrix of *** each communication round,the cluster head node randomly selects its relay target node to send data according to the probability distribution in the random relay vector in the *** two different cluster head configuration scenarios,by optimizing the random relay matrix,RRCEH can effectively reduce the network's configuration requirements for cluster head energy harvesting capability,thus reducing the deployment cost of EHWSN.
Wireless networks with no infrastructure arise as a result of multiple wireless devices working *** Mobile Ad hoc Network(MANET)is a system for connecting independently located Mobile Nodes(MNs)via wireless links.A MA...
详细信息
Wireless networks with no infrastructure arise as a result of multiple wireless devices working *** Mobile Ad hoc Network(MANET)is a system for connecting independently located Mobile Nodes(MNs)via wireless links.A MANET is self-configuring in telecommunications,while MN produces non-infrastructure networks that are entirely *** the MAC and routing layers of MANETs take into account issues related to Quality of Service(QoS).When culling a line of optical discernment communication,MANET can be an effective and cost-saving route cull *** maintain QoS,however,more or fewer challenges must be *** paper proposes a Fuzzy Logic Control(FLC)methodology for specifying a probabilistic QoS guaranteed for *** framework uses network node mobility to establish the probabil-istic quality of *** Logic(FL)implementations were added to Network Simulator-3(NS-3)and used with the proposed FLC framework for *** have found that for a given node’s mobility,the path’s bandwidth decreases with time,hop count,and *** is resolutely based on this fuzzy rule that the priority index for a packet is ***,by avoiding sending pack-ets(PKT)out of source networks when there are no beneficial routes,bandwidth is not *** FLC outperforms the scheduling methods with a wide range of *** improve QoS within MANETs,it is therefore recommended that FLC is used to synchronize ***,using these performance metrics,the QoS-responsible routing can opt for more stable *** on network simulation,it is evident that incorporating QoS into routing protocols is meant to improve traf-fic performance,in particular authentic-time traffic.
This paper proposes an algorithm of divide-compare-swap-based (DCS) sorting that reduces time complexity by utilizing quantum parallelism. A new cost optimized comparator circuit has been designed and simulated using ...
详细信息
Aim/Purpose COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an org...
详细信息
Aim/Purpose COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology The public sector in Israel, which employs about a third of the Israeli workforce, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings More than half of the respondents who reported that they did not use IS before COVID-19 stated
In light of the pressing need to guarantee food security in the face of threats posed by climate change, an increasing global population together with rising incomes, worsening soil erosion, and dwindling water resour...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the human cochlea in response to an external sound stimulus,as a biometric *** are robust to falsification attacks,as the uniqueness of an individual’s inner ear cannot be *** this study,we use both the raw 1D TEOAE signals,as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform(CWT).We use 1D and 2D Convolutional Neural Networks(CNN)for the former and latter,respectively,to derive the feature *** corresponding lower-dimensional feature maps are obtained using principal component analysis,which is then used as features to build classifiers using machine learning techniques for the task of person identification.T-SNE plots of these feature maps show that they discriminate well among the *** the various architectures explored,we achieve a best-performing accuracy of 98.95%and 100%using the feature maps of the 1D-CNN and 2D-CNN,respectively,with the latter performance being an improvement over all the earlier *** performance makes the TEOAE based person identification systems deployable in real-world situations,along with the added advantage of robustness to falsification attacks.
暂无评论