Machine learning (ML) with data analysis has many successful applications and is widely employed daily. Additionally, they have played a significant role in combating the global coronavirus (COVID-19) outbreak. Intern...
详细信息
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video...
详细信息
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ...
详细信息
In the realm of discrete-time modeling for gene regulatory networks, significant focus has been placed on addressing the time lags inherent in the process of DNA transcription to RNA and the subsequent translation of ...
详细信息
Micro-expressions (MEs) are fleeting involuntary facial movements, which occur frequently when people attempt to conceal their emotions. Since human eyesight cannot detect fleeting and slight changes in facial express...
详细信息
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ...
详细信息
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and surroundings leads to Personal IoT(PIoT).PIoT offers users high levels of personalization,automation,and *** proliferation of PIoT technology has extended into society,social engagement,and the interconnectivity of PIoT objects,resulting in the emergence of the Social Internet of Things(SIoT).The combination of PIoT and SIoT has spurred the need for autonomous learning,comprehension,and understanding of both the physical and social *** research on PIoT is dedicated to enabling seamless communication among devices,striking a balance between observation,sensing,and perceiving the extended physical and social environment,and facilitating information ***,the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence(ASI)in PIoT ***,autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful *** paper provides a comprehensive review of the evolving domains of PIoT,SIoT,and ***,the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID *** study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions,paving the way for further advancements in this transformative field.
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ...
详细信息
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing s...
详细信息
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing superpoint segmentation methods focus only on local geometric structures,resulting in inconsistent spectral features of points within a *** feature inconsistencies degrade the performance of subsequent ***,this study proposes a novel Superpoint Segmentation method that jointly utilizes spatial Geometric and Spectral information for multispectral point cloud superpoint segmentation(GSI-SS).Specifically,a similarity metric that combines spatial geometry and spectral information is proposed to facilitate the consistency of geometric structures and object attributes within segmented *** the formation of the primary superpoints,an intersuperpoint pointexchange mechanism that maximizes feature consistency within the final superpoints is *** are conducted on two real multispectral point cloud datasets,and the proposed method achieved higher recall,precision,F score,and lower global consistency and feature classification *** experimental results demonstrate the superiority of the proposed GSI-SS over several state-of-the-art methods.
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
Open Radio Access Networks (O-RANs) represent a novel wireless access network architecture that decomposes traditional RAN functions and makes them openly accessible. O-RANs enable real-time coordination, RAN performa...
详细信息
暂无评论