The Multiply-Accumulate (MAC) Unit is a crucial component in all DSP Applications, due to its ability to perform high-speed arithmetic operations. This research aims to design and implement an 8-bit MAC Unit capable o...
详细信息
The agriculture industry is currently dealing with serious issues with rice plants as a result of illnesses that decrease the quantity and output of the harvest. Numerous fungi and bacteria diseases harm plants that a...
详细信息
An imbalanced dataset often challenges machine learning, particularly classification methods. Underrepresented minority classes can result in biased and inaccurate models. The Synthetic Minority Over-Sampling Techniqu...
详细信息
An imbalanced dataset often challenges machine learning, particularly classification methods. Underrepresented minority classes can result in biased and inaccurate models. The Synthetic Minority Over-Sampling Technique (SMOTE) was developed to address the problem of imbalanced data. Over time, several weaknesses of the SMOTE method have been identified in generating synthetic minority class data, such as overlapping, noise, and small disjuncts. However, these studies generally focus on only one of SMOTE’s weaknesses: noise or overlapping. Therefore, this study addresses both issues simultaneously by tackling noise and overlapping in SMOTE-generated data. This study proposes a combined approach of filtering, clustering, and distance modification to reduce noise and overlapping produced by SMOTE. Filtering removes minority class data (noise) located in majority class regions, with the k-nn method applied for filtering. The use of Noise Reduction (NR), which removes data that is considered noise before applying SMOTE, has a positive impact in overcoming data imbalance. Clustering establishes decision boundaries by partitioning data into clusters, allowing SMOTE with modified distance metrics to generate minority class data within each cluster. This SMOTE clustering and distance modification approach aims to minimize overlap in synthetic minority data that could introduce noise. The proposed method is called “NR-Clustering SMOTE,” which has several stages in balancing data: (1) filtering by removing minority classes close to majority classes (data noise) using the k-nn method;(2) clustering data using K-means aims to establish decision boundaries by partitioning data into several clusters;(3) applying SMOTE oversampling with Manhattan distance within each cluster. Test results indicate that the proposed NR-Clustering SMOTE method achieves the best performance across all evaluation metrics for classification methods such as Random Forest, SVM, and Naїve Bayes, compared t
Fall detection systems are critical for ensuring the safety and well-being of the elderly and others with mobility challenges. This paper presents the design and development of a fall detection system employing a text...
详细信息
The sewer system plays an important role in protecting rainfall and treating urban *** to the harsh internal environment and complex structure of the sewer,it is difficult to monitor the sewer *** are developing diffe...
详细信息
The sewer system plays an important role in protecting rainfall and treating urban *** to the harsh internal environment and complex structure of the sewer,it is difficult to monitor the sewer *** are developing different methods,such as the Internet of Things and Artificial Intelligence,to monitor and detect the faults in the sewer *** learning is a promising artificial intelligence technology that can effectively identify and classify different sewer system ***,the existing deep learning based solution does not provide high accuracy prediction and the defect class considered for classification is very small,which can affect the robustness of the model in the constraint *** a result,this paper proposes a sewer condition monitoring framework based on deep learning,which can effectively detect and evaluate defects in sewer pipelines with high *** also introduce a large dataset of sewer defects with 20 different defect classes found in the sewer *** study modified the original RegNet model by modifying the squeeze excitation(SE)block and adding the dropout layer and Leaky Rectified Linear Units(LeakyReLU)activation function in the Block structure of RegNet *** study explored different deep learning methods such as RegNet,ResNet50,very deep convolutional networks(VGG),and GoogleNet to train on the sewer defect *** experimental results indicate that the proposed system framework based on the modified-RegNet(RegNet+)model achieves the highest accuracy of 99.5 compared with the commonly used deep learning *** proposed model provides a robust deep learning model that can effectively classify 20 different sewer defects and be utilized in real-world sewer condition monitoring applications.
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe...
详细信息
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designed with security because they are resource constrained ***,having an accurate IoT security system to detect security attacks is *** Detection Systems(IDSs)using machine learning and deep learning techniques can detect security attacks *** paper develops an IDS architecture based on Convolutional Neural Network(CNN)and Long Short-Term Memory(LSTM)deep learning *** implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that cate-gorizes the network traffic into normal and attacks *** this work,interpolation data preprocessing is used to compute the missing ***,the imbalanced data problem is solved using a synthetic data generation *** experiments have been implemented to compare the performance results of the proposed model(CNN+LSTM)with a basic model(CNN only)using both balanced and imbalanced ***,with some state-of-the-art machine learning classifiers(Decision Tree(DT)and Random Forest(RF))using both balanced and imbalanced *** results proved the impact of the balancing *** proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy(92.10%)compared with the basic CNN model(89.90%)and the machine learning(DT 88.57%and RF 90.85%)***,comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
Weeds significantly hinder agricultural productivity by reducing crop yields and increasing production costs. Leveraging artificial intelligence (AI) is critical for equipping farmers with early detection capabilities...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conven...
详细信息
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conventional orthogonal frequency division multiplexing(OFDM)modulation,widely employed in cellular and Wi-Fi communication systems,experiences performance degradation due to significant Doppler *** overcome this obstacle,a novel twodimensional(2D)modulation approach,namely orthogonal time frequency space(OTFS),has emerged as a key enabler for future high-mobility use ***,OTFS modulates information within the delay-Doppler(DD)domain,as opposed to the timefrequency(TF)domain utilized by *** offers advantages such as Doppler and delay resilience,reduced signaling latency,a lower peak-to-average ratio(PAPR),and a reduced-complexity *** studies further indicate that the direct interplay between information and the physical world in the DD domain positions OTFS as a promising waveform for achieving integrated sensing and communications(ISAC).In this article,we present an in-depth review of OTFS technology in the context of the 6G era,encompassing fundamentals,recent advancements,and future *** objective is to provide a helpful resource for researchers engaged in the field of OTFS.
Social media has become an essential forum for people to share their thoughts and sentiments owing to the quick rise in mobile technology. Business and political organizations might benefit from understanding public s...
详细信息
暂无评论