Stock analysis is a method used by traders and financial experts to evaluate the securities market and make informed decisions about buying and selling shares. It involves conducting extensive research to assess the p...
详细信息
Appliances in home networks come in various types and models. Homes are fitted with smart televisions, fridges, speakers and even smart locks. All these interact in a smart home area network and many store data in the...
详细信息
Roadside traffic monitoring is increasingly performed by deploying roadside high-resolution video cameras and then running computer Vision (CV) models on the video data. Since computer vision models are compute-intens...
详细信息
ISBN:
(纸本)9798400709098
Roadside traffic monitoring is increasingly performed by deploying roadside high-resolution video cameras and then running computer Vision (CV) models on the video data. Since computer vision models are compute-intensive as they utilize Deep Neural Networks (DNNs), the data is usually sent to one or more edge servers located adjacent to mobile base stations. Recent techniques propose running CV models on tiles of videos separately to detect and track small objects. Several CV models exist, each with different requirements of compute and memory. Since more compute and memory-intensive CV models provide higher accuracy, a key challenge of such techniques is to determine which vision model should be used on which tile. This becomes even more challenging if multiple videos are processed by the same edge server. In this paper, we first formulate this problem of model selection on edge devices as an Integer Linear Programming (ILP) problem, and then propose a heuristic to solve it. Our experiments show that it is quite effective in practice.
Machine learning and deep learning have shown great promise in mobile sensing applications, including Human Activity Recognition. However, the performance of such models in real-world settings largely depends on the a...
详细信息
Dunhuang murals are a precious cultural heritage and their restoration is of vital importance. Traditional image restoration methods and methods based on generative adversarial networks (GANs) have limitations in the ...
详细信息
Efficient energy usage is vital for extending Wireless Sensor Networks (WSNs) lifespan. While Improved LowEnergy Adaptive Clustering Hierarchy (ILEACH) excels in energy-efficient data aggregation, challenges like prem...
Efficient energy usage is vital for extending Wireless Sensor Networks (WSNs) lifespan. While Improved LowEnergy Adaptive Clustering Hierarchy (ILEACH) excels in energy-efficient data aggregation, challenges like premature cluster head $({\text{CH}})$ failure remain. Genetic Algorithm (GA) optimizes parameters, including energy, in WSNs. We propose a novel hybrid ILEACH-GA algorithm for data aggregation. ILEACH forms clusters, GA evaluates fitness, selecting optimal clusters for aggregation. GA mitigates ILEACH's premature CH failure. ILEACH-GA surpasses LEACH, ILEACH, and GA-LEACH, with significantly higher throughput $(10.0\%$ , $47.4{{\% }},21.9{{\% }}$ respectively), retaining higher residual energy (0.0805) and alive nodes $({25.5{{\% }}})$ . This innovation boosts sustainable WSN data aggregation, overcoming limitations, and enhancing performance. This innovation elevates sustainable WSN data aggregation, surmounting limitations, and augmenting performance, applicable in waste and crop management systems.
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as *** study utilizes three distinct methodologies,Term Frequen...
详细信息
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as *** study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing *** study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron *** best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching *** study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems.
Numerous science and engineering fields are involved when handling forest fire disasters. Social sciences contribute to analyze the human behavior behind the forest fire phenomena, while science and engineering princi...
详细信息
Optimization of atomic structures presents a challenging problem, due to their highly rough and non-convex energy landscape, with wide applications in the fields of drug design, materials discovery, and mechanics. Her...
详细信息
暂无评论