The digitization and preservation of Tamil inscriptions are crucial for safeguarding the rich cultural heritage they represent. This study presents an in-depth evaluation of deep learning-based segmentation methods sp...
详细信息
In the digital era, protecting sensitive medical data, including Electrocardiogram (ECG) signals, is of utmost importance. Maintaining the confidentiality, integrity, and authenticity of ECG signals while safeguarding...
详细信息
Automated railway security systems prevent train collisions with trackside obstructions that cause accidents in high-speed railways. Rail safety is being improved and accident rates reduced through continuous research...
详细信息
Accurate detection and tracking of cetaceans in the Indian Ocean remain some of the salient issues for marine conservation despite the abundant challenges that accompany the environment underwater. Such realistic aven...
详细信息
The early and accurate diagnosis of melanoma, a potentially harmful skin cancer, is essential in enhancing the survival of patients. This paper describes a new method for detecting melanoma called Panoptic Region Slic...
详细信息
Out of the most entrusted technological revolutions applied for the advancement of living standards and creation of a more convenient operation in the professional world, the Internet of Things (IoT) has been progress...
详细信息
Integrated sensing and communications (ISAC) is one of the crucial technologies for 6G, and channel state information (CSI) based sensing serves as an essential part of ISAC. However, current research on ISAC focuses ...
详细信息
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this R...
详细信息
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this RS research is limited and needs to be *** previous method did notfind any user reviews within a time,so it gets poor accuracy and doesn’tfilter the irre-levant comments effi*** Recursive Neural Network-based Trust Recom-mender System(RNN-TRS)is proposed to overcome this method’s *** it is efficient to analyse the trust comment and remove the irrelevant sentence ***first step is to collect the data based on the transactional reviews of social *** second step is pre-processing using Imbalanced Col-laborative Filtering(ICF)to remove the null values from the *** the features from the pre-processing step using the Maximum Support Grade Scale(MSGS)to extract the maximum number of scaling features in the dataset and grade the weights(length,count,etc.).In the Extracting features for Training and testing method before that in the feature weights evaluating the softmax acti-vation function for calculating the average weights of the ***,In the classification method,the Recursive Neural Network-based Trust Recommender System(RNN-TRS)for User reviews based on the Positive and negative scores is analysed by the *** simulation results improve the predicting accuracy and reduce time complexity better than previous methods.
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...
详细信息
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate *** science is the science of dealing with data and its relationships through intelligent *** state-of-the-art research focuses independently on either datascience or IIoT,rather than exploring their ***,to address the gap,this article provides a comprehensive survey on the advances and integration of datascience with the Intelligent IoT(IIoT)system by classifying the existing IoT-based datascience techniques and presenting a summary of various *** paper analyzes the datascience or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based *** insights into IoT data security,privacy,and challenges are visualized in the context of datascience for *** addition,this study reveals the current opportunities to enhance datascience and IoT market *** current gap and challenges faced in the integration of datascience and IoT are comprehensively presented,followed by the future outlook and possible solutions.
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism wit...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective *** bots’patterns or features over the network have to be analyzed in both linear and non-linear *** linear and non-linear features are composed of high-level and low-level *** collected features are maintained over the Bag of Features(BoF)where the most influencing features are collected and provided into the classifier ***,the linearity and non-linearity of the threat are evaluated with Support Vector Machine(SVM).Next,with the collected BoF,the redundant features are eliminated as it triggers overhead towards the predictor ***,a novel Incoming data Redundancy Elimination-based learning model(RedE-L)is built to classify the network features to provide robustness towards BotNets *** simulation is carried out in MATLAB environment,and the evaluation of proposed RedE-L model is performed with various online accessible network traffic dataset(benchmark dataset).The proposed model intends to show better tradeoff compared to the existing approaches like conventional SVM,C4.5,RepTree and so ***,various metrics like Accuracy,detection rate,Mathews Correlation Coefficient(MCC),and some other statistical analysis are performed to show the proposed RedE-L model's *** F1-measure is 99.98%,precision is 99.93%,Accuracy is 99.84%,TPR is 99.92%,TNR is 99.94%,FNR is 0.06 and FPR is 0.06 respectively.
暂无评论