Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection ...
详细信息
Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection of autism in *** can seek professional help for a better prognosis of the child’s therapy when ASD is diagnosed under five *** research study aims to develop an automated tool for diagnosing autism in *** computer-aided diagnosis tool for ASD detection is designed and developed by a novel methodology that includes data acquisition,feature selection,and classification *** most deterministic features are selected from the self-acquired dataset by novel feature selection methods before *** Imperialistic competitive algorithm(ICA)based on empires conquering colonies performs feature selection in this *** performance of Logistic Regression(LR),Decision tree,K-Nearest Neighbor(KNN),and Random Forest(RF)classifiers are experimentally studied in this research *** experimental results prove that the Logistic regression classifier exhibits the highest accuracy for the self-acquired *** ASD detection is evaluated experimentally with the Least Absolute Shrinkage and Selection Operator(LASSO)feature selection method and different *** Exploratory Data Analysis(EDA)phase has uncovered crucial facts about the data,like the correlation of the features in the dataset with the class variable.
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine t...
详细信息
作者:
Manjunatha, A.S.Venkatramana Bhat, P.
Department of Computer and Communication Engineering India
Department of Computer Science and Engineering India
Data is collected and forwarded to the cluster head by sensor nodes in the Wireless Sensor Network (WSN). Ensuring the confidentiality and integrity of the data that must be provided to the base station is tough. We r...
详细信息
This paper presents a novel structure of equal and unequal multi-level inverters with low electrical equipment. The proposed multi-level inverter Includes an H-bridge, on the sides of which the level generation cells ...
详细信息
In real-world materials research,machine learning(ML)models are usually expected to predict and discover novel exceptional materials that deviate from the known *** is thus a pressing question to provide an objective ...
详细信息
In real-world materials research,machine learning(ML)models are usually expected to predict and discover novel exceptional materials that deviate from the known *** is thus a pressing question to provide an objective evaluation ofMLmodel performances in property prediction of out-ofdistribution(OOD)materials that are different fromthe training *** performance evaluation of materials property prediction models through the random splitting of the dataset frequently results in artificially high-performance assessments due to the inherent redundancy of typical material datasets.
The surge in interest and application of large language models (LLMs) has sparked a drive to fine-tune these models to suit specific applications, such as finance and medical science. However, concerns regarding data ...
详细信息
Near-field tides prediction for tsunami detection in the coastal area is a significant problem of the cable-based tsunami meter system in north Sipora, Indonesia. The problem is caused by its shallow water condition a...
详细信息
作者:
Baba, AbdullatifAlothman, Basil
Computer Science and Engineering Department Kuwait
Computer Engineering Department Ankara Turkey
This paper explores essential aspects of autonomous underwater vehicle (AUV) design, focusing on hull structure, hydrodynamics, propulsion systems, and sensor integration. It also examines the role of underwater Simul...
详细信息
The advances from the last few decades in the fields of ML (Machine Learning), DL (Deep Learning), and semantic computing are now changing the shape of the healthcare system. But, unlike physical health problems, diag...
详细信息
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effec...
详细信息
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic *** proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced *** preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing *** extensive performance analysis is conducted to illustrate the efficiency of the proposed ***,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running *** security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious *** proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
暂无评论