Cloud computing offers fast processing and large storage, while edge computing reduces delay and local device resource issues. A proper offloading strategy is needed among local devices, edge servers, and cloud server...
详细信息
This abstract presents a versatile cyberbullying detection and prevention system that enables users to engage through their preferred medium while ensuring a safe online environment. It provides real-time monitoring o...
详细信息
The increasing uncertainty in power systems has brought various challenges, including transient stability assessment. The conventional approaches, such as, time-domain simulation approach and direct method (based on L...
详细信息
With the growth of the discipline of digital communication,the topic has acquiredmore attention in the *** Intrusion Detection(ID)system monitors network traffic to detect malicious *** paper introduces a novel Featur...
详细信息
With the growth of the discipline of digital communication,the topic has acquiredmore attention in the *** Intrusion Detection(ID)system monitors network traffic to detect malicious *** paper introduces a novel Feature Selection(FS)approach for *** Search Algorithm(RSA)—is a new optimization algorithm;in this method,each agent searches a new region according to the position of the host,which makes the algorithm suffers from getting stuck in local optima and a slow convergence *** overcome these problems,this study introduces an improved RSA approach by integrating Cauchy Mutation(CM)into the RSA’s ***,the CM can effectively expand search space and enhance the performance of the *** developed RSA-CM is assessed on five publicly available ID datasets:KDD-CUP99,NSL-KDD,UNSW-NB15,CIC-IDS2017,and CIC-IDS2018 and two engineering *** RSA-CM is compared with the original RSA,and three other state-of-the-art FS methods,namely particle swarm optimization,grey wolf optimization,and multi-verse optimizer,and quantitatively is evaluated using fitness value,the number of selected optimum features,accuracy,precision,recall,and F1-score *** results reveal that the developed RSA-CMgot better results than the other competitive methods applied for FS on the ID datasets and the examined engineering ***,the Friedman test results confirm that RSA-CMhas a significant superiority compared to other methods as an FS method for ID.
Augmented Reality (AR) is a technology that mixes components of the physical world with computer-generated information or sensory input in real time. Augmented reality strives to improve the user's perception and ...
详细信息
The demand for service robots is continuously increasing. Robots that can interact with humans are required not only in factories but also in everyday life. This paper proposes a Human-Robot Interaction (HRI) system b...
详细信息
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in...
详细信息
The Internet of Things (IoT) is a constantly expanding system connecting countless devices for seamless data collection and exchange. This has transformed decision-making with data-driven insights across different dom...
详细信息
Mango, a prized fruit in tropical regions, ranks as the third most traded tropical fruit globally, following pineapple and avocado. Despite its economic significance, the quality of mangoes is often compromised by var...
详细信息
Intellihealth is an electronic health record system that operates online with a decentralized structure, setting it apart from conventional systems that store data locally. This decentralized approach relies on blockc...
详细信息
暂无评论