Before the approach of Information Communication Innovations (ICT), social intelligent essentially happened inside restricted social limits, such as neighborhood geological regions. The later headways in communication...
详细信息
Our research investigates the application of single-class Support Vector Machine (SVM) for anomaly detection, which is critical for predictive maintenance. The study utilizes real-world datasets to validate the effect...
详细信息
Optimal supplier selection step is a vital feature of the supply chain, having a great effect on the company's financial and operating results. The standard methodologies that relied on the lowest rate acceptances...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries in digital platforms to facilitate their ***,IIoT is being used in various industrial fields such as logistics,manufacturing,metals and mining,gas and oil,transportation,aviation,and energy *** is mandatory that various industrial fields require highly reliable security and preventive measures against *** detection is defined as the detection in the network of security threats targeting privacy information and sensitive *** Detection Systems(IDS)have taken an important role in providing security in the field of computer *** of intrusion is completely based on the detection functions of the *** an IIoT network expands,it generates a huge volume of data that needs an IDS to detect intrusions and prevent network *** research works have been done for preventing network *** day,the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly *** this regard,this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA(WDLDA).The implemented WDLDA results in a rate of detection accuracy(DRA)of 97%and a false positive rate(FPR)of 11%using the Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD)dataset.
This study makes a comprehensive assessment of the predominant Transfer Learning (TL) techniques employed for the classification of COVID-19 cases in Chest X-rays (CXR) images. The methodologies have been selected on ...
详细信息
This study investigates barely-supervised medical image segmentation where only few labeled data, i.e., single-digit cases are available. We observe the key limitation of the existing state-of-the-art semi-supervised ...
详细信息
The classification of harmful brain activities, such as seizures and periodic discharges, play a vital role in neurocritical care, enabling timely diagnosis and intervention. Electroencephalography (EEG) provides a no...
详细信息
Managing fluctuating workloads and optimizing resource utilization in cloud environments pose significant challenges, particularly in fields requiring real-time data processing, such as healthcare. This paper introduc...
详细信息
With the growing use of deep learning models in medical imaging, it is critical to interpret these models to ensure precise diagnoses. A recent study using the SARS-COV2 dataset evaluated the efficiency of several Exp...
详细信息
The IoT represents a great opportunity for tourism and hospitality to increase customer satisfaction while simulta-neously reducing operational costs. Smart tourism involves using smart technology and practices to boo...
详细信息
暂无评论