Speech processing devices such as mobile telephone, hearing aid, cochlear implant is commonly equipped with a designed microphone array (MA) to capture the acoustic environment. The MA signals often contain a mixture ...
详细信息
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)*** education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost ...
详细信息
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)*** education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost *** to the unavailability of informationtechnology(IT)infrastructures,HEI is vulnerable to *** authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so *** study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC *** proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint ***,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the *** addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of ***,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification ***,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several *** experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.
Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day *** results in illegal access to users’private data and compromises *** is a...
详细信息
Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day *** results in illegal access to users’private data and compromises *** is a popular attack which tricked the user into accessing malicious data and gaining the *** identification of phishing emails can be treated as an essential process in the domain of *** article focuses on the design of bio-geography based optimization with deep learning for Phishing Email detection and classification(BBODL-PEDC)*** major intention of the BBODL-PEDC model is to distinguish emails between legitimate and *** BBODL-PEDC model initially performs data pre-processing in three levels namely email cleaning,tokenization,and stop word ***,TF-IDF model is applied for the extraction of useful feature ***,optimal deep belief network(DBN)model is used for the email classification and its efficacy can be boosted by the BBO based hyperparameter tuning *** performance validation of the BBODL-PEDC model can be performed using benchmark dataset and the results are assessed under several *** comparative studies reported the superior outcomes of the BBODL-PEDC model over the recent approaches.
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s...
详细信息
An effective hands-free speech interface with an appropriate digital signal processing is essential for teleconference systems and control systems. Beamforming technique, which use a microphone array (MA) is an ideal ...
详细信息
—Wireless telecommunication systems are essential in transferring data through fog cloud servers. However, the fog cloud servers suffer from unreliable and non-secure routing and limited power resources when mobile u...
详细信息
As businesses move their data and services to cloud computing environments, it is crucial to ensure the security and integrity of that shared data. In order to study the new security perspectives in the context of int...
详细信息
India, whose population growth is its greatest asset cannot afford to let its people eat confectionery that is either tainted or somehow polluted, since this would lead to extensive malnutrition. Traditional food supp...
详细信息
In recent years,Smart City Infrastructures(SCI)have become familiar whereas intelligent models have been designed to improve the quality of living in smart ***,anomaly detection in SCI has become a hot research topic ...
详细信息
In recent years,Smart City Infrastructures(SCI)have become familiar whereas intelligent models have been designed to improve the quality of living in smart ***,anomaly detection in SCI has become a hot research topic and is widely explored to enhance the safety of *** increasing popularity of video surveillance system and drastic increase in the amount of collected videos make the conventional physical investigation method to identify abnormal actions,a laborious *** this background,Deep Learning(DL)models can be used in the detection of anomalies found through video surveillance *** current research paper develops an Internet of Things Assisted Deep Learning Enabled Anomaly Detection Technique for Smart City Infrastructures,named(IoTAD-SCI)*** aim of the proposed IoTAD-SCI technique is to mainly identify the existence of anomalies in smart city ***,IoTAD-SCI technique involves Deep Consensus Network(DCN)model design to detect the anomalies in input video *** addition,Arithmetic Optimization Algorithm(AOA)is executed to tune the hyperparameters of the DCN ***,ID3 classifier is also utilized to classify the identified objects in different *** experimental analysis was conducted for the proposed IoTADSCI technique upon benchmark UCSD anomaly detection dataset and the results were inspected under different *** simulation results infer the superiority of the proposed IoTAD-SCI technique under different metrics.
We report on the design, development and prototype testing of gensimo (GENeric Social Insurance MOdeling), a free and open-source software framework for modelling and simulation of social insurance systems. We discuss...
详细信息
暂无评论