In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical...
详细信息
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical Mobile Ad-hoc Network(MANET),hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out,self-mending and *** in the routing process is one of the key aspects to increase MANET performance by coordinat-ing the pathways using multiple criteria and *** present a Group Adaptive Hybrid Routing Algorithm(GAHRA)for gathering portability,which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile *** on this aspect,the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach,with the objectives of enhancing the out-put of MANET routing computation in each *** analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications.
A recent study revealed that fake articles spread considerably faster than factual content on Twitter, specifically at a 70% higher rate of retweets and reaching the first 1,500 users six times faster. This highlights...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various frequency bands.A recent wireless communication network uses OFDM in longterm evolution(LTE)and 5G,among *** main problem faced by 5G wireless OFDM is distortion of transmission signals in the *** transmission loss is called peak-to-average power ratio(PAPR).This wireless signal distortion can be reduced using various *** study uses machine learning-based algorithm to solve the problem of PAPR in 5G wireless *** transmit sequence(PTS)helps in the fast transfer of data in wireless *** is merged with deep belief neural network(DBNet)for the efficient processing of signals in wireless 5G *** indicates that the proposed system outperforms other existing ***,PAPR reduction in OFDM by DBNet is optimized with the help of an evolutionary algorithm called particle swarm ***,the specified design supports in improving the proposed PAPR reduction architecture.
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-ba...
详细信息
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-based rehabilitation. It is intended to observe the children's performance in terms of concentration, attention, and identification. The observation has been done through placards as a target image to display the 3D objects on a mobile phone or tablet. In this project, observations are made for 21 autism children in the age group of 7–14, out of whom 17 are boys and 5 are girls. Those 21 children are given practice identifying 15 different objects in an augmented reality environment. Their performance was initially evaluated using conventional instructional techniques. The majority of the kids were having more difficulty identifying things during that observation. Then, with an Augmented Reality environment, the identical observation has been made once more. Using a mobile device or tablet, the 3D objects from the provided placard photos are produced in an augmented reality environment with animation and voice in the languages of English and Tamil. Children with autism are able to recognize and also grasp the behaviors of those objects while viewing them in 3D. Their efforts are measured using a two-point scale (0, 1, 2). The pre-assessment and post-assessment reports for the above observations are tabulated. All the observations are made in the presence of the special education teacher (therapist). However, the children observed in this project fall into three different categories: mild, moderate, and severe. In the Mild category, statistical significance is evident with p values of 0.002 in pre-assessment and 0.014 in post-assessment. Likewise, in the Moderate category, where p values are 0.023 in pre-assessment and 0.033 in post-assessment, significance is observed, as all p values fall below the chosen significance level of 0.05. This leads to rejecti
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** add...
详细信息
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** addition,Cloud computing is incompatible with several industries,including finance and ***-key cryptography is frequently cited as a significant advancement in *** contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive *** study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key *** strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced *** the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure *** suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of *** on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data.
Video object detection aims to identify the objects that appear in the frame of video *** challenges in video object detection include the degradation of video frames caused by fast motion,occlusion,scale variations,a...
详细信息
ISBN:
(数字)9798350376470
ISBN:
(纸本)9798350376487
Video object detection aims to identify the objects that appear in the frame of video *** challenges in video object detection include the degradation of video frames caused by fast motion,occlusion,scale variations,and the need for real-time processing. To achieve these challenges, we have analyzed var-ious approaches, such as two-stage detectors(e.g.,Faster R-CNN or CNN) and one-stage detectors(e.g.,CenterNet),which adapt to video data, Sequence Level Semantics Aggregation(SELSA) module (working on cluster of frames). The motivation for using deep learning, particularly CNN *** this system is their ability to handle complex scenes,lighting variations, feature extraction,and different object types. The versatile and efficient algorithm for video object detection,offers real-time performance,accuracy, and the ability to detect multiple objects in a single *** this highlights the importance of video object detection and the advancements in technology that make it possible to tackle real-world video analysis tasks effectively.
Video surveillance systems are often used for traffic monitoring and to characterize traffic load. However, most of the surveillance videos are low frame rated and extracting the right motion feature from them is a ch...
详细信息
Text summarization is an advanced domain in the natural language processing (NLP) field, to shorten a large amount of text into meaningful condensed summaries to get more enhanced information. While generating summari...
详细信息
ISBN:
(数字)9798331519582
ISBN:
(纸本)9798331519599
Text summarization is an advanced domain in the natural language processing (NLP) field, to shorten a large amount of text into meaningful condensed summaries to get more enhanced information. While generating summaries, maintaining the intact of the original text is very important. Furthermore, to generate the original summaries from the text, i.e. for abstractive summarization, the inclusion of neural networks and generative AI is highly required. Considering the importance of text summarization in different fields, and the advancements in generative AI models, this paper seeks to analyze the capabilities of generative AI models i.e., Mistral-7B, LLaMA3-8B, and BART-large CNN for text summarization. With tools such as LangChain and Hugging Face pipelines, the said models have been integrated to produce abstractive summaries. This study uses the DialogSum dataset, along with Groq & Google Colab experimental frameworks. Well-known evaluation metrics like ROUGE, BLEU, and BERT Score further strengthen the comprehensiveness of their evaluations of these models. The findings suggest that Mistral-7B was found to have the best performance among others. This paper also presents the capacity of different models and their ability to meet the desired output of summarization, which further facilitates text summarization-related tasks in different industries.
The threat posed by credit card fraud, and by extension, online banking, continues to grow with the convenience brought forth by online banking services. Many financial institutions and customers stand at great risk b...
详细信息
暂无评论