Currently, numerous smart products are based on glass substrates. However, defects that occur during the production of glass substrates affect the quality and safety of the final products. Accordingly, we develop...
详细信息
With the advancement of medical care and technology, human life expectancy is increasing, many advanced countries have aging societies, and the elderly have increasing needs for society to address;these have become so...
详细信息
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance...
详细信息
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhances the prediction performance of classifiers when tested on unseen *** learning(DL)models have a lot of parameters,and they frequently ***,to avoid overfitting,data plays a major role to augment the latest improvements in ***,reliable data collection is a major limiting ***,this problem is undertaken by combining augmentation of data,transfer learning,dropout,and methods of normalization in *** this paper,we introduce the application of data augmentation in the field of image classification using Random Multi-model Deep Learning(RMDL)which uses the association approaches of multi-DL to yield random models for *** present a methodology for using Generative Adversarial Networks(GANs)to generate images for data *** experiments,we discover that samples generated by GANs when fed into RMDL improve both accuracy and model *** across both MNIST and CIAFAR-10 datasets show that,error rate with proposed approach has been decreased with different random models.
One of the major challenges in bioinformatics lies in identification of modified gene expressions of an affected person due to medical ailments. Focused research has been observed till date in such identification, lea...
详细信息
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the Wo...
详细信息
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the World Health Organization (WHO), approximately 1.35 million people are involved in road traffic crashes resulting in loss of life or physical disability. WHO attributes events like over-speeding, drunken driving, distracted driving, dilapidated road infrastructure and unsafe practices such as non-use of helmets and seatbelts to road traffic accidents. As these driving events negatively affect driving quality and enhance the risk of a vehicle crash, they are termed as negative driving attributes. Methods: A multi-level hierarchical fuzzy rules-based computational model has been designed to capture risky driving by a driver as a driving risk index. Data from the onboard telematics device and vehicle controller area network is used for capturing the required information in a naturalistic way during actual driving conditions. Fuzzy rules-based aggregation and inference mechanisms have been designed to alert about the possibility of a crash due to the onset of risky driving. Results: On-board telematics data of 3213 sub-trips of 19 drivers has been utilized to learn long term risky driving attributes. Furthermore, the current trip assessment of these drivers demonstrates the efficacy of the proposed model in correctly modeling the driving risk index of all of them, including 7 drivers who were involved in a crash after the monitored trip. Conclusion: In this work, risky driving behavior has been associated not just with rash driving but also other contextual data like driver’s long-term risk aptitude and environmental context such as type of roads, traffic volume and weather conditions. Trip-wise risky driving behavior of six out of seven drivers, who had met with a crash during that trip, was correctly predicted during evaluation. Similarly, for the other 12
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-...
详细信息
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as *** provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct *** the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk ***file could be retrieved by performing the opera-tions in *** the regenerating code,the model could regenerate the missing and corrupted chunks from the *** proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage *** results analysis show that the proposed model has been tested with storage space and response time for storage and *** VCSA model consumes 1.5x(150%)storage *** was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA *** response time VCSA model was tested with different sizedfiles starting from 2 to 16 *** response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval.
In this paper, we consider the problem of multi-cell interference coordination by joint beamforming and power control. Recent efforts have explored the use of reinforcement learning (RL) methods to tackle this complex...
详细信息
Traditional password-based authentication methods confront several issues such as security weaknesses, user inconvenience, and susceptibility to various attacks, e.g. phishing. These issues are solved with newly creat...
详细信息
暂无评论