The use of unmanned aerial vehicles (UAVs) as aerial base stations has attracted increasing research interest in recent years. A key challenge in this field is determining how to deploy multiple UAVs in dynamic enviro...
详细信息
Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Exis...
详细信息
The field of sentiment analysis(SA)has grown in tandem with the aid of social networking platforms to exchange opinions and *** people share their views and ideas around the world through social media like Facebook an...
详细信息
The field of sentiment analysis(SA)has grown in tandem with the aid of social networking platforms to exchange opinions and *** people share their views and ideas around the world through social media like Facebook and *** goal of opinion mining,commonly referred to as sentiment analysis,is to categorise and forecast a target’s *** on if they provide a positive or negative perspective on a given topic,text documents or sentences can be *** compared to sentiment analysis,text categorization may appear to be a simple process,but number of challenges have prompted numerous studies in this area.A feature selection-based classification algorithm in conjunction with the firefly with levy and multilayer perceptron(MLP)techniques has been proposed as a way to automate sentiment analysis(SA).In this study,online product reviews can be enhanced by integrating classification and feature *** firefly(FF)algorithm was used to extract features from online product reviews,and a multi-layer perceptron was used to classify sentiment(MLP).The experiment employs two datasets,and the results are assessed using a variety of *** account of these tests,it is possible to conclude that the FFL-MLP algorithm has the better classification performance for Canon(98%accuracy)and iPod(99%accuracy).
With the rapid development of headmounted devices, eye tracking as an emerging human-computer interaction technology, has gained increasing importance. However, pupil detection, the core algorithm in eye tracking, suf...
详细信息
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
This paper considers the problem of evaluating the effectiveness of the finished goods warehouse of a manufacturing company, in which a modified TPM method - Total Productive Management (TPM2) - was applied to improve...
详细信息
This paper considers the problem of evaluating the effectiveness of the finished goods warehouse of a manufacturing company, in which a modified TPM method - Total Productive Management (TPM2) - was applied to improve productivity. A multi-stage methodology was proposed, including a decision to modify the system, determination of the scope of changes, monitoring the results obtained and a multi-criteria evaluation of the changes made. The decision to make modifications to the existing system was motivated by the lower-than-expected quality of customer service (frequent delivery delays). With regard to the transport department, lean flow pillar activities were focused on analysing losses (muda) in warehouse processes (product loading and package unloading). The purpose of these activities was to minimise interruptions in warehouse processes (product loading and package unloading). "The steps for solving the problem" methodology based on Deming's PDCA cycle was used to solve the problem. The analysis covered, among other things, the information flow processes between production planning and the customer service department, the planning processes of the dispatcher, the efficiency of the loading processes, and the causes of interruptions in warehouse operations. The analyses employed the chronometry of selected works, the 5W + 1H method and the Pareto method. By using the 5S method and some characteristics of the SMED method, the organisation of loading work was decisively changed (shunting yard changes, appropriate buffers for transport equipment). The changes introduced in the system were monitored for several months. Appropriately defined OEE indicators were used to assess the behaviour of the system after the changes. The indicators consider the use of available warehouse time, the efficiency of the loading process and the quality of the tasks performed. The results that can be achieved are presented using the specific example of the finished goods warehouse of a ma
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from...
详细信息
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from attackers when millions of users circulate the same network for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing data security approach prioritizes protecting data at rest in cloud storage but gives less thought to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts. Methods: The third-party auditor is provided access to data during the transfer phase, which is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data more susceptible to unauthorized access. However, growing concerns regarding data privacy and security have made outsourcing sensitive information to faraway data centers difficult. As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management. Results: The proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64, and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is illustrated graphically via simulation results. This strategy reduces power consumption by 13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes. Conclusion: As a result, the recommended architecture enhance
Unmanned Combat Aerial Vehicles (UCAVs) are becoming a critical part of the military to automate complex missions with minimum risk and increased efficiency. Path planning is a necessary routine for UCAVs to guide the...
详细信息
The present paper analyses and tests the standard oxygen transfer efficiency (SOTE) of a diffused air aeration system with fine bubble disc diffusers. The proposed diffuser density was required to demonstrate an oxyge...
详细信息
The purpose of this paper is to highlight the solar energy potential of the city of Constanța for the propulsion of electric cars. The solar energy available to the city of Constanța was obtained with the help of the ...
详细信息
暂无评论