Federated learning (FL) is a new learning framework for training machine learning and deep learning models using data spread over several edge devices. Edge devices like mobile phones and IoT devices have constraints ...
详细信息
Burn injuries constitute a significant public health challenge, often necessitating the expertise of medical professionals for diagnosis. However, in scenarios where specialized facilities are unavailable, the utility...
详细信息
Wireless Sensor Network(WSNs)consists of a group of nodes that analyze the information from surrounding *** sensor nodes are responsible for accumulating and exchanging ***,node local-ization is the process of identif...
详细信息
Wireless Sensor Network(WSNs)consists of a group of nodes that analyze the information from surrounding *** sensor nodes are responsible for accumulating and exchanging ***,node local-ization is the process of identifying the target node’s *** this research work,a Received Signal Strength Indicator(RSSI)-based optimal node localization approach is proposed to solve the complexities in the conventional node localization ***,the RSSI value is identified using the Deep Neural Network(DNN).The RSSI is conceded as the range-based method and it does not require special hardware for the node localization process,also it consumes a very minimal amount of cost for localizing the nodes in 3D *** position of the anchor nodes is fixed for detecting the location of the ***,the optimal position of the target node is identified using Hybrid T cell Immune with Lotus Effect Optimization algorithm(HTCI-LEO).During the node localization process,the average localization error is minimized,which is the objective of the optimal node *** the regular and irregular surfaces,this hybrid algorithm effectively performs the localization *** suggested hybrid algorithm converges very fast in the three-dimensional(3D)*** accuracy of the proposed node localization process is 94.25%.
The foundation of the applicant selection process is the candidate eligibility criteria. All applications must go through some evaluation process to get selected for a job. Without the use of a machine learning algori...
详细信息
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnos...
详细信息
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnostic advanced particle manipulation functions are achieved,unlocking new avenues for microfluidic systems and lab-on-a-chip *** localized acoustofluidic effects of GFWs arising from the evanescent nature of the acoustic fields they induce inside a liquid medium are numerically investigated to highlight their unique and promising *** traditional acoustofluidic technologies,the GFWs propagating on the MAWA’s membrane waveguide allow for cavity-agnostic particle manipulation,irrespective of the resonant properties of the fluidic ***,the acoustofluidic functions enabled by the device depend on the flexural mode populating the active region of the membrane *** demonstrations using two types of particles include in-sessile-droplet particle transport,mixing,and spatial separation based on particle diameter,along with streaming-induced counter-flow virtual channel generation in microfluidic PDMS *** experiments emphasize the versatility and potential applications of the MAWA as a microfluidic platform targeted at lab-on-a-chip development and showcase the MAWA’s compatibility with existing microfluidic systems.
One of the primary reasons of illness and mortality across the world is cardiovascular disease (CVD), for the timely detection of which the need for accurate detection methods persists. The last years have seen the de...
详细信息
In recent years, there has been a persistent focus on developing systems that can automatically identify the hate speech content circulating on diverse social media platforms. This paper describes the team "Trans...
详细信息
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from...
详细信息
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from attackers when millions of users circulate the same network for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing data security approach prioritizes protecting data at rest in cloud storage but gives less thought to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts. Methods: The third-party auditor is provided access to data during the transfer phase, which is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data more susceptible to unauthorized access. However, growing concerns regarding data privacy and security have made outsourcing sensitive information to faraway data centers difficult. As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management. Results: The proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64, and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is illustrated graphically via simulation results. This strategy reduces power consumption by 13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes. Conclusion: As a result, the recommended architecture enhance
Over the past years, researchers across the globe have made significant efforts to develop systems capable of identifying the presence of hate speech in different languages. This paper describes the team Transformers&...
详细信息
Around the world, kidney diseases are a major open prosperity concern. Environmental components, tall salt levels, and additional minutes are all risk factors. Kidney dissatisfaction can be a critical prosperity issue...
详细信息
暂无评论