The method of finding natural groupings within multidimensional data based on some similarity metrics is known as data clustering. There are many clustering algorithms proposed over time, and many of them have gained ...
详细信息
Email is still a preferred method of one-to-one communication among customers, businesses, and employees. As the usage of emails is increasing daily, the number of spam emails is also increasing. Many natural language...
详细信息
The evolution of technology with the introduction of mobile devices has provided users with day-to-day advancements in existing technologies. Augmented Reality (AR) is combined with an Artificial Intelligence navigati...
详细信息
This paper describes a proposed design for a 1P PocketQube Earth observation satellite being developed by undergraduate students at Wentworth institute of technology. This satellite will push boundaries in satellite m...
详细信息
Students frequently experience issues while taking notes, which interferes with their ability to study. There are many reasons students miss to take notes in college. Without notes, they might miss on important inform...
详细信息
The Internet of Things (IoT) paradigm has gradually become prevalent in all facets of life. Due to advancements in academia, business and industry, it may be possible to apply IoT to underwater surroundings, which hav...
详细信息
Cooperative Intelligent Transport System(C-ITS)plays a vital role in the future road traffic management system.A vital element of C-ITS comprises vehicles,road side units,and traffic command centers,which produce a ma...
详细信息
Cooperative Intelligent Transport System(C-ITS)plays a vital role in the future road traffic management system.A vital element of C-ITS comprises vehicles,road side units,and traffic command centers,which produce a massive quantity of data comprising both mobility and service-related *** the extraction of meaningful and related details out of the generated data,data science acts as an essential part of the upcoming C-ITS *** the same time,prediction of short-term traffic flow is highly essential to manage the traffic *** to the rapid increase in the amount of traffic data,deep learning(DL)models are widely employed,which uses a non-parametric approach for dealing with traffic flow *** paper focuses on the design of intelligent deep learning based short-termtraffic flow prediction(IDL-STFLP)model for C-ITS that assists the people in various ways,namely optimization of signal timing by traffic signal controllers,travelers being able to adapt and alter their routes,and so *** presented IDLSTFLP model operates on two main stages namely vehicle counting and traffic flow *** IDL-STFLP model employs the Fully Convolutional Redundant Counting(FCRC)based vehicle count *** addition,deep belief network(DBN)model is applied for the prediction of short-term traffic *** further improve the performance of the DBN in traffic flow prediction,it will be optimized by Quantum-behaved bat algorithm(QBA)which optimizes the tunable parameters of *** results based on benchmark dataset show that the presented method can count vehicles and predict traffic flowin real-time with amaximumperformance under dissimilar environmental situations.
Haze lowers the quality of images by making them harder to see and warping colours and shapes that makes it challenging to use in many computer vision apps. This article suggests a new Combined Light and Dark Priors V...
详细信息
The article discusses the challenges of using deep learning in healthcare due to the lack of extensive medical datasets and concerns about confidentiality and privacy. The article then focuses on the analysis of skin ...
详细信息
Smartphones play an extensive position withinside most company investigations into cyber intrusions. Investigations from the Law Enforcement additionally contain cellular gadgets sporting crucial proof that could assi...
详细信息
Smartphones play an extensive position withinside most company investigations into cyber intrusions. Investigations from the Law Enforcement additionally contain cellular gadgets sporting crucial proof that could assist carry the case to its logical conclusion. Smartphones are utilized in several crook justice contexts. The company presents mobile telephones to lots of its personnel as a part of their task duties, and the BOYD (carry your very own tool) idea is broadly adopted, permitting customers to get admission to workplace applications (like Outlook, Skype, etc.) the usage of their very own transportable gadgets. Based on forensic proof from research starting from conventional crimes (homicide, robbery, kidnapping, etc.) to technological crimes like cybersecurity incidents on company-huge cellular facilities, unlawful get admission to or exchanges, or facts theft, the cybercrime inquiry unit can be required to capture the cellular gadgets and ship them to FLS for added analysis. The chain of custody high-quality practices for securing mobile telephones, iPads, company cellular telephones, and BYOD gadgets in a manner that protects the integrity of the proof and is consequently suited in courtroom docket are in short defined on this paper. This paper's chain of custody technique was created especially for cellular platforms which require specific application of mind and use of tools in the reconstruction of the scene of crime as well as management of the evidence due to the variety of operating systems and nature of dynamic evidence which mobile devices have. The necessities of the commercial enterprise and regulation enforcement agencies that might use the record for normal cellular tool investigations in India have been taken into consideration while it was being developed. This paper has been written retaining in view the necessities of each enterprise in addition to the Law Enforcement Agencies to apply it for his or her everyday cybersecurity investigations
暂无评论