In this day and age of online and digital transactions, credit cards have come up as a popular option of payment. This has led to the increase in the fraudulent credit card transactions and as a result the banks and t...
详细信息
In Intelligent Transportation Systems(ITS),controlling the trafficflow of a region in a city is the major ***,allocation of the traffic-free route to the taxi drivers during peak hours is one of the challenges to control...
详细信息
In Intelligent Transportation Systems(ITS),controlling the trafficflow of a region in a city is the major ***,allocation of the traffic-free route to the taxi drivers during peak hours is one of the challenges to control the trafficfl***,in this paper,the route between the taxi driver and pickup location or hotspot with the spatial-temporal dependencies is ***,the hotspots in a region are clustered using the density-based spatial clustering of applications with noise(DBSCAN)algorithm tofind the hot spots at the peak hours in an urban ***,the optimal route is allocated to the taxi driver to pick up the customer in the *** allocating the optimal route,each route between the taxi driver and the hot spot is mapped to the number of taxi *** the map function,the optimal map is selected using the rain opti-mization algorithm(ROA).If more than one map function is obtained as the opti-mal solution,the map between the route and the taxi driver who has done the least number of trips in the day is chosen as thefinal solution This optimal route selec-tion leads to control of the trafficflow at peak *** of the approach depicts that the proposed trafficflow control scheme reduces traveling time,wait-ing time,fuel consumption,and emission.
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specime...
详细信息
The cross-view matching of local image features is a fundamental task in visual localization and 3D *** study proposes FilterGNN,a transformer-based graph neural network(GNN),aiming to improve the matching efficiency ...
详细信息
The cross-view matching of local image features is a fundamental task in visual localization and 3D *** study proposes FilterGNN,a transformer-based graph neural network(GNN),aiming to improve the matching efficiency and accuracy of visual *** on high matching sparseness and coarse-to-fine covisible area detection,FilterGNN utilizes cascaded optimal graph-matching filter modules to dynamically reject outlier ***,we successfully adapted linear attention in FilterGNN with post-instance normalization support,which significantly reduces the complexity of complete graph learning from O(N2)to O(N).Experiments show that FilterGNN requires only 6%of the time cost and 33.3%of the memory cost compared with SuperGlue under a large-scale input size and achieves a competitive performance in various tasks,such as pose estimation,visual localization,and sparse 3D reconstruction.
Fog computing is considered a derivative of cloud computing that aims to reduce the huge transmission latency and CPU time, as well as the overall cost of resource usage in the cloud. The deployment of Internet-o...
详细信息
Fog computing is considered a derivative of cloud computing that aims to reduce the huge transmission latency and CPU time, as well as the overall cost of resource usage in the cloud. The deployment of Internet-of-Things (IoT) enabled smart systems, which frequently demand real-time processing, is rapidly expanding. Following that, the volume of generated data and computation workload dramatically increased. Fog resources are limited and typically resource constrained. Therefore, it is impossible to execute all tasks at the edge network. To support the increasing amounts of data and computation, cloud computing, associated with significant delays in transmission and processing of workload, is used. The distribution of tasks between the cloud and fog layer and the allocation of layer resources to satisfy the users' demands prevents layer oversaturation, service degradation, and resource failure due to excessive workload is challenging. This paper proposes a layer fit algorithm that evenly distributes tasks between the fog and cloud, based on priority levels. Also, a Modified Harris-Hawks Optimization (MHHO) based meta-heuristic approach is proposed to assign the best available resource to a task within a layer. The key intention of this paper is to reduce the makespan time, task execution cost, and power consumption and enhance resource usage in both the fog and cloud layer. The simulations are performed using the iFogSim simulation toolkit. The proposed layer fit algorithm and the Modified Harris-Hawks Optimization (MHHO) are compared with the traditional Harris-Hawks Optimization (HHO), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), and the Firefly Algorithm (FA). Based on the experimental results, the MHHO has improved the performance of the system in terms of makespan time, execution cost, and energy consumption. The ability of the MHHO to balance the load across resources yields a significant improvement when the number of tasks increases as c
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly *** and smart contract technologies,with their decentralized nature,provide strong security g...
详细信息
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly *** and smart contract technologies,with their decentralized nature,provide strong security guarantees for ***,at the same time,smart contracts themselves face numerous security challenges,among which reentrancy vulnerabilities are particularly *** detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer *** address these limitations,this paper proposes a novel detection method that combines pattern matching with deep ***,we carefully identify and define three common patterns of reentrancy vulnerabilities in smart ***,we extract key vulnerability features based on these ***,we employ a Graph Attention Neural Network to extract graph embedding features from the contract graph,capturing the complex relationships between different components of the ***,we use an attention mechanism to fuse these two sets of feature information,enhancing the weights of effective information and suppressing irrelevant information,thereby significantly improving the accuracy and robustness of vulnerability *** results demonstrate that our proposed method outperforms existing state-ofthe-art techniques,achieving a 3.88%improvement in accuracy compared to the latest vulnerability detection model AME(Attentive Multi-Encoder Network).This indicates that our method effectively reduces false positives and false negatives,significantly enhancing the security and reliability of smart contracts in the evolving IoT ecosystem.
Pervasive computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ...
详细信息
Pervasive computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and surroundings leads to Personal IoT(PIoT).PIoT offers users high levels of personalization,automation,and *** proliferation of PIoT technology has extended into society,social engagement,and the interconnectivity of PIoT objects,resulting in the emergence of the Social Internet of Things(SIoT).The combination of PIoT and SIoT has spurred the need for autonomous learning,comprehension,and understanding of both the physical and social *** research on PIoT is dedicated to enabling seamless communication among devices,striking a balance between observation,sensing,and perceiving the extended physical and social environment,and facilitating information ***,the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence(ASI)in PIoT ***,autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful *** paper provides a comprehensive review of the evolving domains of PIoT,SIoT,and ***,the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID *** study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions,paving the way for further advancements in this transformative field.
In the present research,we describe a computer-aided detection(CAD)method aimed at automatic fetal head circumference(HC)measurement in 2D ultrasonography pictures during all trimesters of *** HC might be utilized tow...
详细信息
In the present research,we describe a computer-aided detection(CAD)method aimed at automatic fetal head circumference(HC)measurement in 2D ultrasonography pictures during all trimesters of *** HC might be utilized toward determining gestational age and tracking fetal *** automated approach is particularly valuable in low-resource settings where access to trained sonographers is *** CAD system is divided into two steps:to begin,Haar-like characteristics were extracted from ultrasound pictures in order to train a classifier using random forests to find the fetal *** identified the HC using dynamic programming,an elliptical fit,and a Hough *** computer-aided detection(CAD)program was well-trained on 999 pictures(HC18 challenge data source),and then verified on 335 photos from all trimesters in an independent test set.A skilled sonographer and an expert in medicine personally marked the test *** used the crown-rump length(CRL)measurement to calculate the reference gestational age(GA).In the first,second,and third trimesters,the median difference between the standard GA and the GA calculated by the skilled sonographer stayed at 0.7±2.7,0.0±4.5,and 2.0±12.0 days,*** regular duration variance between the baseline GA and the health investigator’s GA remained 1.5±3.0,1.9±5.0,and 4.0±14 a couple of *** mean variance between the standard GA and the CAD system’s GA remained between 0.5 and 5.0,with an additional variation of 2.9 to 12.5 *** outcomes reveal that the computer-aided detection(CAD)program outperforms an expert *** paired with the classifications reported in the literature,the provided system achieves results that are comparable or even *** have assessed and scheduled this computerized approach for HC evaluation,which includes information from all trimesters of gestation.
Accidents caused by drivers who exhibit unusual behavior are putting road safety at ever-greater risk. When one or more vehicle nodes behave in this way, it can put other nodes in danger and result in potentially cata...
详细信息
In healthcare,the persistent challenge of arrhythmias,a leading cause of global mortality,has sparked extensive research into the automation of detection using machine learning(ML)***,traditional ML and AutoML approac...
详细信息
In healthcare,the persistent challenge of arrhythmias,a leading cause of global mortality,has sparked extensive research into the automation of detection using machine learning(ML)***,traditional ML and AutoML approaches have revealed their limitations,notably regarding feature generalization and automation *** glaring research gap has motivated the development of AutoRhythmAI,an innovative solution that integrates both machine and deep learning to revolutionize the diagnosis of *** approach encompasses two distinct pipelines tailored for binary-class and multi-class arrhythmia detection,effectively bridging the gap between data preprocessing and model *** validate our system,we have rigorously tested AutoRhythmAI using a multimodal dataset,surpassing the accuracy achieved using a single dataset and underscoring the robustness of our *** the first pipeline,we employ signal filtering and ML algorithms for preprocessing,followed by data balancing and split for *** second pipeline is dedicated to feature extraction and classification,utilizing deep learning ***,we introduce the‘RRI-convoluted trans-former model’as a novel addition for binary-class *** ensemble-based approach then amalgamates all models,considering their respective weights,resulting in an optimal model *** our study,the VGGRes Model achieved impressive results in multi-class arrhythmia detection,with an accuracy of 97.39%and firm performance in precision(82.13%),recall(31.91%),and F1-score(82.61%).In the binary-class task,the proposed model achieved an outstanding accuracy of 96.60%.These results highlight the effectiveness of our approach in improving arrhythmia detection,with notably high accuracy and well-balanced performance metrics.
暂无评论