Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af...
详细信息
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
In today’s growing modern world environment,as human food activities are changing,it is affecting human health,thus leading to diseases like *** is a complex disease with many subtypes that affect human health withou...
详细信息
In today’s growing modern world environment,as human food activities are changing,it is affecting human health,thus leading to diseases like *** is a complex disease with many subtypes that affect human health without premature treatment and cause *** the analysis of early diagnosis and prognosis of cancer studies can improve clinical management by analyzing various features of observa-tion,which has become necessary to classify the type in cancer *** research needs importance to organize the risk of the cancer patients based on data analysis to predict the result of premature *** paper introduces a Maximal Region-Based Candidate Feature Selection(MRCFS)for early risk diagnosing using Soft-Max Feed Forward Neural Classification(SMF2NC)to solve the above *** predictive model is based on a different relational feature learning model,which is possessed to candidate selection to reduce the *** redundant features are processed marginal weight rates for observing similar features’variants and the absolute *** neural hidden layers are trained using the Sigmoid Activation Function(SAF)to create the logical condition for feed-forward ***,the maximal features are introduced to invite a deep neural network con-structed on the Feed Forward Recurrent Neural Network(FFRNN).The classifier produces higher classification accuracy than the previous methods and observes the cancer detection,which is recommended for early diagnosis.
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electro...
详细信息
In the realm of agricultural automation, the precise identification of crop stress holds immense significance for enhancing crop productivity. Existing methods primarily focus on controlled environments, which may not...
详细信息
作者:
K.MeenakshiG.MaragathamSchool of Computing
Department of Networking and CommunicationsSRM Institute of Science and TechnologyKattankulathurChennai603203India School of Computing
Department of Computational IntelligenceSRM Institute of Science and TechnologyKattankulathurChennai603203India
Deep Learning is one of the most popular computerscience techniques,with applications in natural language processing,image processing,pattern iden-tification,and various *** the success of these deep learning algorit...
详细信息
Deep Learning is one of the most popular computerscience techniques,with applications in natural language processing,image processing,pattern iden-tification,and various *** the success of these deep learning algorithms in multiple scenarios,such as spam detection,malware detection,object detection and tracking,face recognition,and automatic driving,these algo-rithms and their associated training data are rather vulnerable to numerous security *** threats ultimately result in significant performance ***,the supervised based learning models are affected by manipulated data known as adversarial examples,which are images with a particular level of noise that is invisible to *** inputs are introduced to purposefully confuse a neural network,restricting its use in sensitive application areas such as bio-metrics *** this paper,an optimized defending approach is proposed to recognize the adversarial iris examples *** Curvelet Transform Denoising method is used in this defense strategy,which examines every sub-band of the adversarial images and reproduces the image that has been changed by the *** salient iris features are retrieved from the reconstructed iris image by using a pretrained Convolutional Neural Network model(VGG 16)followed by Multiclass *** classification is performed by using Support Vector Machine(SVM)which uses Particle Swarm Optimization method(PSO-SVM).The proposed system is tested when classifying the adversarial iris images affected by various adversarial attacks such as FGSM,iGSM,and Deep-fool *** experimental result on benchmark iris dataset,namely IITD,produces excellent outcomes with the highest accuracy of 95.8%on average.
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Pr...
详细信息
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Providers(CSPs),the research focuses on minimizing job completion delays through efficient task *** Johnson’s rule from operations research,the study addresses the challenge of resource availability post-task *** advocates for queuing models with multiple servers and finite capacity to improve job scheduling models,subsequently reducing wait times and queue *** Dynamic Johnson Sequencing Algorithm and the M/M/c/K queuing model are applied to optimize task sequences,showcasing their efficacy through comparative *** research evaluates the impact of makespan calculation on data file transfer times and assesses vital performance indicators,ultimately positioning the proposed technique as superior to existing approaches,offering a robust framework for enhanced task scheduling and resource allocation in cloud computing.
Existing Unbiased Scene Graph Generation (USGG) methods only focus on addressing the predicate-level imbalance that high-frequency classes dominate predictions of rare ones, while overlooking the concept-level imbalan...
详细信息
The practice of integrating images from two or more sensors collected from the same area or object is known as image *** goal is to extract more spatial and spectral information from the resulting fused image than fro...
详细信息
The practice of integrating images from two or more sensors collected from the same area or object is known as image *** goal is to extract more spatial and spectral information from the resulting fused image than from the component *** images must be fused to improve the spatial and spectral quality of both panchromatic and multispectral *** study provides a novel picture fusion technique that employs L0 smoothening Filter,Non-subsampled Contour let Transform(NSCT)and Sparse Representation(SR)followed by the Max absolute rule(MAR).The fusion approach is as follows:first,the multispectral and panchromatic images are divided into lower and higher frequency components using the L0 smoothing *** comes the fusion process,which uses an approach that combines NSCT and SR to fuse low frequency ***,the Max-absolute fusion rule is used to merge high frequency ***,the final image is obtained through the disintegration of fused low and high frequency *** terms of correlation coefficient,Entropy,spatial frequency,and fusion mutual information,our method outperforms other methods in terms of image quality enhancement and visual evaluation.
Person re-identification (Re-ID) is a classical computer vision task and has significant applications for public security and information forensics. Recently, long-term Re-ID with clothes-changing has attracted increa...
详细信息
Unmanned Aerial vehicles (UAV) are high-speed moving machines that attained rapid growth in various activities and are considered an integral component in the Satellite-Air -Ground-Sea (SAGS) incorporated network. How...
详细信息
暂无评论