The number of sensors and IoT devices has increased dramatically in last several years. In recent years, the number of IoT devices and sensors has increased significantly. Solving the purpose of fog computing processi...
详细信息
Federated understanding techniques have actually shown prospective, in the medical care sector allowing cooperation as well as information sharing while promoting personal privacy and also safety and security steps. T...
Facial Expression Recognition(FER)has been an importantfield of research for several *** of emotional characteristics is crucial to FERs,but is complex to process as they have significant intra-class *** characteristi...
详细信息
Facial Expression Recognition(FER)has been an importantfield of research for several *** of emotional characteristics is crucial to FERs,but is complex to process as they have significant intra-class *** characteristics have not been completely explored in static *** studies used Convolution Neural Networks(CNNs)based on transfer learning and hyperparameter optimizations for static facial emotional *** Swarm Optimizations(PSOs)have also been used for tuning ***,these methods achieve about 92 percent in terms of *** existing algorithms have issues with FER accuracy and ***,the overall FER performance is degraded *** address this issue,this work proposes a combination of CNNs and Long Short-Term Memories(LSTMs)called the HCNN-LSTMs(Hybrid CNNs and LSTMs)approach for *** work is evaluated on the benchmark dataset,Facial Expression Recog Image Ver(FERC).Viola-Jones(VJ)algorithms recognize faces from preprocessed images followed by HCNN-LSTMs feature extractions and FER ***,the success rate of Deep Learning Techniques(DLTs)has increased with hyperparameter tunings like epochs,batch sizes,initial learning rates,regularization parameters,shuffling types,and *** proposed work uses Improved Weight based Whale Optimization Algorithms(IWWOAs)to select near-optimal settings for these parameters using bestfitness *** experi-mentalfindings demonstrated that the proposed HCNN-LSTMs system outper-forms the existing methods.
This paper presents our system for generating counter-speech (CN) in response to hate speech (HS), developed for the COLING 2025 shared task. We employ lightweight transformer-based models, DistilBART and T5-small, op...
详细信息
It takes a lot of work to develop a computerized method for classifying plants for medicinal purposes. There are countless kinds of plants found in India, and each one has its own unique set oftherapeutic advantages. ...
详细信息
Wireless Sensor Networks (WSNs) have enabled new and revolutionary technological packages by using imparting self-reliant sensing, control, and verbal exchange capabilities. Time collection analysis is an important ap...
详细信息
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in...
详细信息
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks
This research paper introduces an innovative file-sharing platform, engineered to redefine the standards of scalability, privacy, and security in digital file distribution. By utilizing user-provided remote storage se...
详细信息
ISBN:
(数字)9798350392111
ISBN:
(纸本)9798350392128
This research paper introduces an innovative file-sharing platform, engineered to redefine the standards of scalability, privacy, and security in digital file distribution. By utilizing user-provided remote storage services like Google Drive and OneDrive, the platform enables users to share files without directly hosting them, thereby achieving unparalleled scalability. The core mechanism involves encrypting the file’s URL and storing it in a key-value database. When a file download is requested, the platform employs serverless computing technologies, such as AWS Lambda, to initiate a download stream directly from the remote host. This approach ensures that the file’s origin remains concealed, upholding user anonymity and file security. By leveraging serverless technology, the platform mitigates traditional file-sharing challenges, offering a scalable, secure, and private method of file distribution. This paper delves into the technical architecture of the platform, evaluates its performance, and discusses its implications in the current digital landscape, where data security and privacy are paramount.
Correction: The Visual computer https://***/10.1007/s00371-024-03572-3 The publication of this article unfortunately contained mistakes. Figure 3 was not correct. The corrected figure is given below. Wrong figure...
Headaches are the most prevalent medical condition in the globe. The migraine is one of the various types of headaches. Along with their excruciating headaches, migraineurs often have nausea, vomiting fits, and light ...
详细信息
暂无评论