We study the maximum weight convex polytope problem, in which the goal is to find a convex polytope maximizing the total weight of enclosed points. Prior to this work, the only known result for this problem was an O(n...
The application of virtual reality (VR) across various sectors is becoming more widespread, playing a pivotal role in the advancement of the metaverse. However, the prevalence of VR sickness undermines user experience...
详细信息
Computational narrative is a complex field. While the computational processing of narratives has been tackled from different perspectives, the literature has focused on the analysis of a main plot, even if it is compo...
详细信息
Medical image segmentation is a challenging task especially when dealing with unlabeled data. It has been proven that the use of complementary information for co-training is effective for medical image segmentation. W...
详细信息
Threat intelligence provides a platform for cybersecurity engineers for attack traceability, which provides substantial knowledge database logs to defend against future security threats. Threat intelligence relationsh...
详细信息
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho...
详细信息
Human microchip implants are small devices that are implanted into the body for various purposes including storing and transmitting information, monitoring health or location, and providing access to facilities or sys...
详细信息
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete...
详细信息
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet...
详细信息
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet of Things(IoT)technology,the security of IoT networks is developing a vital *** of the huge number and varied kinds of IoT devices,it can be challenging task for protecting the IoT framework utilizing a typical *** typical IDSs have their restrictions once executed to IoT networks because of resource constraints and ***,this paper presents a new Blockchain Assisted Intrusion Detection System using Differential Flower Pollination with Deep Learning(BAIDS-DFPDL)model in IoT *** presented BAIDS-DFPDLmodelmainly focuses on the identification and classification of intrusions in the IoT *** accomplish this,the presented BAIDS-DFPDL model follows blockchain(BC)technology for effective and secure data transmission among the ***,the presented BAIDSDFPDLmodel designs Differential Flower Pollination based feature selection(DFPFS)technique to elect ***,sailfish optimization(SFO)with Restricted Boltzmann Machine(RBM)model is applied for effectual recognition of *** simulation results on benchmark dataset exhibit the enhanced performance of the BAIDS-DFPDL model over other models on the recognition of intrusions.
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems requir...
详细信息
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems require the drivers to search for an empty parking space with no guaran-tee of finding any wasting time,resources,and causing unnecessary *** address these issues,this paper proposes a digitized parking system with a proof-of-concept implementation that combines multiple technological concepts into one solution with the advantages of using IoT for real-time tracking of park-ing *** authentication and automated payments are handled using a quick response(QR)code on entry and *** experiments were done on real data collected for six different locations in Cairo via a live popular times *** machine learning models were investigated in order to estimate the occu-pancy rate of certain ***,a clear analysis of the differences in per-formance is illustrated with the final model deployed being *** has achieved the most efficient results with a R^(2) score of 85.7%.
暂无评论