Nowadays,commercial transactions and customer reviews are part of human life and various business *** technologies create a great impact on online user reviews and activities,affecting the business *** reviews and rat...
详细信息
Nowadays,commercial transactions and customer reviews are part of human life and various business *** technologies create a great impact on online user reviews and activities,affecting the business *** reviews and ratings are more helpful to the new customer to purchase the product,but the fake reviews completely affect the *** traditional systems consume maximum time and create complexity while analyzing a large volume of customer ***,in this work optimized recommendation system is developed for analyzing customer reviews with minimum ***,Amazon Product Kaggle dataset information is utilized for investigating the customer *** collected information is analyzed and processed by batch normalized capsule networks(NCN).The network explores the user reviews according to product details,time,price purchasing factors,etc.,ensuring product quality and *** effective recommendation system is developed using a butterfly optimized matrix factorizationfiltering *** the system’s efficiency is evaluated using the Rand Index,Dunn index,accuracy,and error rate.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
The application of noninvasive methods to enhance healthcare systems has been facilitated by the development of new technology. Among the four major cardiovascular diseases, stroke is one of the deadliest and potentia...
详细信息
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-...
详细信息
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-based privacy preservation over the smart city based on query ***,there is a lack of resources to handle the incoming data and maintain them with higher privacy and ***,a solution based idea needs to be proposed to preserve the IoT data to set an innovative city environment.A querying service model is proposed to handle the incoming data collected from various environments as the data is not so trusted and highly sensitive towards *** handling privacy,other inter-connected metrics like efficiency are also essential,which must be considered to fulfil the privacy ***,this work provides a query-based service model and clusters the query to measure the relevance of frequently generated ***,a Bag of Query(BoQ)model is designed to collect the query from various *** is done with a descriptive service provisioning model to cluster the query and extract the query’s summary to get thefinal *** processed data is preserved over the cloud storage system and optimized using an improved Grey Wolf Opti-mizer(GWO).It is used to attain global and local solutions regarding privacy *** iterative data is evaluated without any over-fitting issues and computational complexity due to the tremendous data handling *** on this analysis,metrics like privacy,efficiency,computational complexity,the error rate is *** simulation is done with a MATLAB 2020a *** proposed model gives a better trade-off in contrast to existing approaches.
Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic *** signals are highly chaotic compared to normal brain signals and thus...
详细信息
Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic *** signals are highly chaotic compared to normal brain signals and thus can be identified from EEG *** the current seizure detection and classification landscape,most models primarily focus on binary classification—distinguishing between seizure and non-seizure *** effective for basic detection,these models fail to address the nuanced stages of seizures and the intervals between *** identification of per-seizure or interictal stages and the timing between seizures is crucial for an effective seizure alert *** granularity is essential for improving patient-specific interventions and developing proactive seizure management *** study addresses this gap by proposing a novel AI-based approach for seizure stage classification using a Deep Convolutional Neural Network(DCNN).The developed model goes beyond traditional binary classification by categorizing EEG recordings into three distinct classes,thus providing a more detailed analysis of seizure *** enhance the model’s performance,we have optimized the DCNN using two advanced techniques:the Stochastic Gradient Algorithm(SGA)and the evolutionary Genetic Algorithm(GA).These optimization strategies are designed to fine-tune the model’s accuracy and ***,k-fold cross-validation ensures the model’s reliability and generalizability across different data *** and validated on the Bonn EEG data sets,the proposed optimized DCNN model achieved a test accuracy of 93.2%,demonstrating its ability to accurately classify EEG *** summary,the key advancement of the present research lies in addressing the limitations of existing models by providing a more detailed seizure classification system,thus potentially enhancing the effectiveness of real-time seizure prediction and management systems in clinic
Vehicle to Everything (V2X) is a core 5G technology. V2X and its enabler, Device-to-Device (D2D), are essential for the Internet of Things (IoT) and the Internet of Vehicles (IoV). V2X enables vehicles to communicate ...
详细信息
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer(CRC)in clinical ***,due to scale variation and blurry polyp boundaries,it is still a challenging task to achieve satisfac...
详细信息
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer(CRC)in clinical ***,due to scale variation and blurry polyp boundaries,it is still a challenging task to achieve satisfactory segmentation performance with different scales and *** this study,we present a novel edge-aware feature aggregation network(EFA-Net)for polyp segmentation,which can fully make use of cross-level and multi-scale features to enhance the performance of polyp ***,we first present an edge-aware guidance module(EGM)to combine the low-level features with the high-level features to learn an edge-enhanced feature,which is incorporated into each decoder unit using a layer-by-layer ***,a scale-aware convolution module(SCM)is proposed to learn scale-aware features by using dilated convolutions with different ratios,in order to effectively deal with scale ***,a cross-level fusion module(CFM)is proposed to effectively integrate the cross-level features,which can exploit the local and global contextual ***,the outputs of CFMs are adaptively weighted by using the learned edge-aware feature,which are then used to produce multiple side-out segmentation *** results on five widely adopted colonoscopy datasets show that our EFA-Net outperforms state-of-the-art polyp segmentation methods in terms of generalization and *** implementation code and segmentation maps will be publicly at https://***/taozh2017/EFANet.
In large-scale information systems, storage device performance continues to improve while workloads expand in size and access characteristics. This growth puts tremendous pressure on caches and storage hierarchy in te...
详细信息
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-ba...
详细信息
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-based rehabilitation. It is intended to observe the children's performance in terms of concentration, attention, and identification. The observation has been done through placards as a target image to display the 3D objects on a mobile phone or tablet. In this project, observations are made for 21 autism children in the age group of 7–14, out of whom 17 are boys and 5 are girls. Those 21 children are given practice identifying 15 different objects in an augmented reality environment. Their performance was initially evaluated using conventional instructional techniques. The majority of the kids were having more difficulty identifying things during that observation. Then, with an Augmented Reality environment, the identical observation has been made once more. Using a mobile device or tablet, the 3D objects from the provided placard photos are produced in an augmented reality environment with animation and voice in the languages of English and Tamil. Children with autism are able to recognize and also grasp the behaviors of those objects while viewing them in 3D. Their efforts are measured using a two-point scale (0, 1, 2). The pre-assessment and post-assessment reports for the above observations are tabulated. All the observations are made in the presence of the special education teacher (therapist). However, the children observed in this project fall into three different categories: mild, moderate, and severe. In the Mild category, statistical significance is evident with p values of 0.002 in pre-assessment and 0.014 in post-assessment. Likewise, in the Moderate category, where p values are 0.023 in pre-assessment and 0.033 in post-assessment, significance is observed, as all p values fall below the chosen significance level of 0.05. This leads to rejecti
As the demand for storage capacity continues to rise, Shingled Magnetic Recording (SMR) disks promise higher storage density through the overlapping of adjacent tracks. However, the sequential write constraint inheren...
详细信息
暂无评论