Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a vi...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone *** researchers have also emphasised using hybrid models to improve forecast ***,this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years,summarising data preprocessing,univariate machine learning modelling strategy,advantages and disadvantages of standalone ML techniques,hybrid models,and performance *** study focuses on two types of hybrid models:parameter optimisation-based hybrid models(OBH)and hybridisation of parameter optimisation-based and preprocessing-based hybridmodels(HOPH).Overall,this research supports the idea thatmeta-heuristic approaches precisely improveML ***’s also one of the first efforts to comprehensively examine the efficiency of various meta-heuristic approaches(classified into four primary classes)hybridised with ML *** study revealed that previous research applied swarm,evolutionary,physics,and hybrid metaheuristics with 77%,61%,12%,and 12%,***,there is still room for improving OBH and HOPH models by examining different data pre-processing techniques and metaheuristic algorithms.
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)syste...
详细信息
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)system takes an input expression from a hearing or speaking-impaired person and outputs it in the form of text or voice to a normal *** existing study related to the Sign Language Recognition system has some drawbacks,such as a lack of large datasets and datasets with a range of backgrounds,skin tones,and *** research efficiently focuses on Sign Language Recognition to overcome previous *** importantly,we use our proposed Convolutional Neural Network(CNN)model,“ConvNeural”,in order to train our ***,we develop our own datasets,“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”,both of which have ambiguous backgrounds.“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”both include images of Bangla characters and numerals,a total of 24,615 and 8437 images,***“ConvNeural”model outperforms the pre-trained models with accuracy of 98.38%for“BdSL_OPSA22_STATIC1”and 92.78%for“BdSL_OPSA22_STATIC2”.For“BdSL_OPSA22_STATIC1”dataset,we get precision,recall,F1-score,sensitivity and specificity of 96%,95%,95%,99.31%,and 95.78%***,in case of“BdSL_OPSA22_STATIC2”dataset,we achieve precision,recall,F1-score,sensitivity and specificity of 90%,88%,88%,100%,and 100%respectively.
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit...
详细信息
A very important strategy for strengthening the security, durability, and efficiency of civil infrastructure is predictive maintenance. This research explores how to assess critical assets such as highways, bridges, a...
详细信息
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex *** Architecture is one of the recent technique...
详细信息
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex *** Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed *** methodology brings numerous benefits like scalability,resilience,flexibility in development,faster time to market,*** the advantages;Microservices bring some challenges *** microservices need to be invoked one by one as a *** most applications,more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s *** results in competition for resources and the need for more inter-service communication among the services,which increases the overall latency of the application.A new approach has been proposed in this paper to handle a complex chain of microservices and reduce the latency of user requests.A machine learning technique is followed to predict the weighting time of different types of *** communication time among services distributed among different physical machines are estimated based on that and obtained insights are applied to an algorithm to calculate their priorities dynamically and select suitable service instances to minimize the latency based on the shortest queue waiting *** were done for both interactive as well as non interactive workloads to test the effectiveness of the *** approach has been proved to be very effective in reducing latency in the case of long service chains.
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
Due to the increasing prominence of social network services, political communication has experienced a paradigm shift. To communicate with internet users, politicians, candidates, and political organizations create fa...
详细信息
Existing end-to-end quality of service (QoS) prediction methods based on deep learning often use one-hot encodings as features, which are input into neural networks. It is difficult for the networks to learn the infor...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT *** rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT *** DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT *** BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal *** experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy *** are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack *** method,without feature selection,demonstrates advantages in training time and detection ***,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.
Context:Decentralized autonomous organizations are a new form of smart contract-based *** autonomous organization platforms,which support the creation of such organizations,are becoming increasingly popular,such as Ar...
详细信息
Context:Decentralized autonomous organizations are a new form of smart contract-based *** autonomous organization platforms,which support the creation of such organizations,are becoming increasingly popular,such as Aragon and *** the best fitting platform is challenging for organizations,as a significant number of decision criteria,such as popularity,developer availability,governance issues and consistent documentation of such platforms,should be ***,decision-makers at the organizations are not experts in every domain,so they must continuously acquire volatile knowledge regarding such ***:Supporting decision-makers in selecting the right decentralized autonomous organization platforms by designing an effective decision model is the main objective of this *** aim to provide more insight into their selection process and reduce time and effort significantly by designing a decision ***:This study presents a decision model for the decentralized autonomous organization platform selection *** decision model captures knowledge regarding such platforms and concepts *** model is based on an existing theoretical framework that assists software engineers with a set of multi-criteria decision-making problems in software ***:We conducted three industry case studies in the context of three decentralized autonomous organizations to evaluate the effectiveness and efficiency of the decision model in assisting *** case study participants declared that the decision model provides significantly more insight into their selection process and reduces time and ***:We observe in the empirical evidence from the case studies that decision-makers can make more rational,efficient,and effective decisions with the decision ***,the reusable form of the captured knowledge regarding decentralized autonomous organization platforms can be
暂无评论