In this paper, a BCI-based machine learning method is proposed to predict the attention lapse of the driver. An EEG headset is used to capture brain activity from different regions of the human brain. The data is furt...
详细信息
WSN has been exhilarated in many application areas such as military, medical, envi-ronment, etc. Due to the rapid increase in applications, it causes proportionality to security threats because of its wireless communi...
详细信息
In image registration, traditional optimization techniques are incapable of detecting the optimum value of geometric transformation parameters. To resolve this issue, a novel scheme of monomodal (isomodal) biomedical ...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident preventi...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic *** these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle *** paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly ***-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by *** systems can autonomously create specific models based on network data to differentiate between regular traffic and *** these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational *** evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and *** review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV *** examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
Segment Routing is a source routing paradigm that simplifies packet forwarding and management across networks. Two major challenges of segment routing are the limitation of header stack size and the size of the Forwar...
详细信息
The electrocardiogram is a vital piece of information about a person's health that provides measurements of changes in the cardiovascular system. When using complex software modules to diagnose diseases, the clini...
详细信息
In this ambitious agricultural project, cutting-edge technologies such as Machine Learning (ML) and Deep Learning (DL) are harnessed to revolutionize farming practices in India. The primary focus lies in automating vi...
详细信息
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t...
详细信息
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...
详细信息
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate *** science is the science of dealing with data and its relationships through intelligent *** state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their ***,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various *** paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based *** insights into IoT data security,privacy,and challenges are visualized in the context of data science for *** addition,this study reveals the current opportunities to enhance data science and IoT market *** current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.
This study presents a comprehensive intervention approach designed to address dyscalculia in early education. The strategy employs a comprehensive approach that incorporates colour identification, numerical enumeratio...
详细信息
暂无评论