There is a requirement for document recommendation frameworks focusing on certain domains linked to medical sciences and biosciences like biomedical document recommendation in the era of the Web 3.0. This paper propos...
详细信息
Model-to-model transformations involve converting one type of the model into another. This can be used in many ways for various reasons, considering model performance with particular deployment platforms. This paper i...
详细信息
In this paper,the authors revisit decentralized control of linear quadratic(LQ)*** of imposing an assumption that the process and observation noises are Gaussian,the authors assume that the controllers are restricted ...
详细信息
In this paper,the authors revisit decentralized control of linear quadratic(LQ)*** of imposing an assumption that the process and observation noises are Gaussian,the authors assume that the controllers are restricted to be *** authors show that the multiple decentralized control models,the form of the best linear controllers is identical to the optimal controllers obtained under the Gaussian noise *** main contribution of the paper is the solution ***,optimal controllers for decentralized LQ systems are identified using dynamic programming,maximum principle,or spectral *** authors present an alternative approach which is based by combining elementary building blocks from linear systems,namely,completion of squares,state splitting,static reduction,orthogonal projection,(conditional)independence of state processes,and decentralized estimation.
With the expanding applicability of the Internet of Things (IoT), novel IoT network security challenges also appear more frequently. Host-based Mimicry Attacks (HMA) are one of them that is difficult to detect by trad...
详细信息
This work introduces an intrusion detection system (IDS) tailored for industrial internet of things (IIoT) environments based on an optimized convolutional neural network (CNN) model. The model is trained on a dataset...
详细信息
In this paper, we introduce the Maximum Distance Sublattice Problem (MDSP). We observed that the problem of solving an instance of the Closest Vector Problem (CVP) in a lattice L is the same as solving an instance of ...
详细信息
The art of hiding secret text within an innocuous cover medium is steganography. Steganalysis is the counterpart of steganography which focuses on the detection and extraction of the secret text from the medium. Featu...
详细信息
ISBN:
(数字)9783031612985
ISBN:
(纸本)9783031612978
The art of hiding secret text within an innocuous cover medium is steganography. Steganalysis is the counterpart of steganography which focuses on the detection and extraction of the secret text from the medium. Feature engineering is the crucial field in Stegware Analysis which intends to identify more specific features, focusing on the accuracy and efficiency. Feature engineering is a process in Machine learning where the features of any dataset are selected and extracted for further use. Feature engineering is the process of extracting, transforming and selecting the most relevant features form the data that aids in discriminating between the stego and cover image. This is because, most of the time, the data will be in a raw format. Any ML model needs the data to be pre-processed and kept ready to train the model. Thus, from the pool of raw data, the required data needs to be selected and can be used in training the model. Further, the data at point needs to be extracted to get the precise data. The scope of the work is to identify the various feature engineering techniques available in practice and efficiently use them to achieve high accuracy and precision in the system. The survey focuses on the several feature selection and extraction techniques like filter method, wrapper method and embedded methods. Correlation being one of the feature selection methods is focused;while statistical moments computes the mean, variance and skewness of the feature. The extraction method holds the Computation of Invariants and other such. Comparative study is made on both the methods to understand the concepts with ease. The work starts by taking a sample from the dataset and few feature extraction techniques are applied on the same. Then the original image is compared with the extracted images with the view of histogram. The paper gives valuable insights into the effectiveness of different feature engineering techniques using the dataset and underscores the importance of featu
Democratic voting is one of the significant aspects of governance that has various complications which are as follows;Complication arising from transparency Complication arising from low voter turnout Complication ari...
详细信息
Social media users articulate their opinions on a broad spectrum of subjects and share their experiences through posts comprising multiple modes of expression, leading to a notable surge in such multimodal content on ...
详细信息
作者:
PrathyakshiniPrathwiniPratheeksha Hegde, N.VaishaliRashmi, N.Kumar, Archana Praveen
NMAM Institute of Technology Department of Information Science and Engineering Karkala Nitte India
NMAM Institute of Technology Department of Master of Computer Applications Karkala Nitte India
NMAM Institute of Technology Department of Computer Science and Engineering Karkala Nitte India Manipal Academy of Education
Manipal Institute of Technology Department of Computer Science and Engineering India
Speech recognition systems play an integral role in numerous applications, from virtual assistants to accessibility tools. This paper offers a new viewpoint to speech recognition utilizing computer vision and deep lea...
详细信息
暂无评论