Recommendation systems (RS) have become prevalent across different domains including music, e-commerce, e-learning, entertainment, and social media to address the issue of information overload. While traditional RS ap...
详细信息
Nowadays, IoT is growing rapidly and is a security concern as there are multiple security policy violations. Furthermore, blockchain development has grown rapidly since Bitcoin first became popular. IoT security issue...
详细信息
Low-light image enhancement is highly desirable for outdoor image processing and computer vision applications. Research conducted in recent years has shown that images taken in low-light conditions often pose two main...
详细信息
The size of the medical information system is growing gradually. Due to this, traditional data analysis for extracting helpful information for any disease has become inefficient in providing accurate real-time valid i...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
In this study, tests were done to see what would happen if hydrogen (H2) and lemon grass oil (LO) were used for a lone-cylinder compression ignition engine as a partial diesel replacement. After starting the trial wit...
详细信息
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie...
详细信息
The integration of electric and flying vehicle (EnFV) systems has ushered in a new era of transportation, offering promising solutions for reducing carbon emissions and improving urban mobility. However, optimizing ro...
详细信息
The integration of electric and flying vehicle (EnFV) systems has ushered in a new era of transportation, offering promising solutions for reducing carbon emissions and improving urban mobility. However, optimizing routing in these systems poses significant challenges due to their multi-objective nature, including minimizing energy consumption, travel time and ensuring safety. In this study, we explore applying hybrid metaheuristic approaches as a viable solution to tackle the complex routing optimization problem in EnFV systems. By combining multiple metaheuristic algorithms, these hybrid approaches can offer improved performance and efficiency, contributing to the sustainable evolution of transportation systems. We present an in-depth analysis of this domain's state-of-the-art research, methodologies, and promising results. The paper discusses the background and related work in routing optimization for EnFV systems, highlights various metaheuristic algorithms and their limitations, and introduces hybridization techniques to address the challenges of multi-objective optimization. Real-world case studies demonstrate the successful implementation of hybrid metaheuristic approaches in routing optimization. Performance evaluation and analysis of the advantages and trade-offs of hybridization provide valuable insights into the effectiveness of these approaches. Furthermore, the paper identifies challenges specific to EnFV routing and explores potential areas for future research and enhancements to hybrid metaheuristic techniques. In conclusion, the review underscores the significance of routing optimization in EnFV systems and emphasizes the potential of hybrid metaheuristics to shape the future of sustainable and optimized transportation systems. IEEE
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrela...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrelated or the original one,when tampering has no ***,standard version of non-malleable codes provide security against one time tampering *** ciphers are successfully employed in the construction of non-malleable *** construction fails to provide security when an adversary tampers the codeword more than *** non-malleable codes further allow an attacker to tamper the message for polynomial number of *** this work,we propose continuous version of non-malleable codes from block ciphers in split-state *** construction provides security against polynomial number of tampering attacks and it preserves *** the tam-pering experiment triggers self-destruct,the security of continuously non-malleable code reduces to security of the underlying leakage resilient storage.
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of ...
详细信息
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of life,conversational assistive technologies include speech recognition APIs,text-to-speech APIs and various communication tools that are *** real-time *** natural language processing(NLP)and machine learning algorithms,the technology analyzes spoken language and provides appropriate responses,offering an immersive experience through voice commands,audio feedback and vibration ***/methodology/approach:These technologies have demonstrated their ability to promote self-confidence and self-reliance in visually impaired individuals during social ***,they promise to improve social competence and foster better *** short,assistive technology in conversation stands as a promising tool that empowers the visually impaired individuals,elevating the quality of their social ***:The main benefit of assistive communication technology is that it will help visually impaired people overcome communication barriers in social *** technology helps them communicate effectively with acquaintances,family,co-workers and even strangers in public *** enabling smoother and more natural communication,it works to reduce feelings of isolation and increase overall quality of ***/value:Research findings include successful activity recognition,aligning with activities on which the VGG-16 model was trained,such as hugging,shaking hands,talking,walking,waving and *** originality of this study lies in its approach to address the challenges faced by the visually impaired individuals in their social interactions through modern *** adds to the body of knowledge in the area of assistive technologies,which contribute to the empowerment and social in
暂无评论