The increasing prevalence of electric vehicles (EVs) highlights the need to create effective and accessible charging systems. However, wireless charging methods for electric vehicles currently face several obstacles. ...
详细信息
For future Internet of Vehicles (IoV), communications and computing will converge to provide services. Federated learning (FL), as one of the typical distributed computing technologies, needs to be integrated with IoV...
详细信息
In this paper, design and modeling of an all-optical 2×1 multiplexer based on 2D photonic crystals and artificial neural networks (ANNs) are presented. The proposed structure aims to maximize the difference betwe...
详细信息
This work introduces a new methodology, Vision Transformer with Attention-based Feature Mapping and Optimized Ensemble Learning (VTAF-Ensemble), which includes three advanced techniques: Vision Transformer-Based Segme...
详细信息
The growing spectrum of Generative Adversarial Network (GAN) applications in medical imaging, cyber security, data augmentation, and the field of remote sensing tasks necessitate a sharp spike in the criticality of re...
详细信息
The growing spectrum of Generative Adversarial Network (GAN) applications in medical imaging, cyber security, data augmentation, and the field of remote sensing tasks necessitate a sharp spike in the criticality of review of Generative Adversarial Networks. Earlier reviews that targeted reviewing certain architecture of the GAN or emphasizing a specific application-oriented area have done so in a narrow spirit and lacked the systematic comparative analysis of the models’ performance metrics. Numerous reviews do not apply standardized frameworks, showing gaps in the efficiency evaluation of GANs, training stability, and suitability for specific tasks. In this work, a systemic review of GAN models using the PRISMA framework is developed in detail to fill the gap by structurally evaluating GAN architectures. A wide variety of GAN models have been discussed in this review, starting from the basic Conditional GAN, Wasserstein GAN, and Deep Convolutional GAN, and have gone down to many specialized models, such as EVAGAN, FCGAN, and SIF-GAN, for different applications across various domains like fault diagnosis, network security, medical imaging, and image segmentation. The PRISMA methodology systematically filters relevant studies by inclusion and exclusion criteria to ensure transparency and replicability in the review process. Hence, all models are assessed relative to specific performance metrics such as accuracy, stability, and computational efficiency. There are multiple benefits to using the PRISMA approach in this setup. Not only does this help in finding optimal models suitable for various applications, but it also provides an explicit framework for comparing GAN performance. In addition to this, diverse types of GAN are included to ensure a comprehensive view of the state-of-the-art techniques. This work is essential not only in terms of its result but also because it guides the direction of future research by pinpointing which types of applications require some
A critical component of video surveillance research and real-world applications is the detection of anomalous events. In order to improve public safety, more and more surveillance cameras are being installed in public...
详细信息
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computation...
详细信息
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computational systems is changing with the advancement in *** to shrinking and smaller chip size power densities onchip are increasing rapidly that increasing chip temperature in multi-core embedded *** operating speed of the device decreases when power consumption reaches a threshold that causes a delay in complementary metal oxide semiconductor(CMOS)circuits because high on-chip temperature adversely affects the life span of the *** this paper an energy-aware dynamic power management technique based on energy aware earliest deadline first(EA-EDF)scheduling is proposed for improving the performance and reliability by reducing energy and power consumption in the system on chip(SOC).Dynamic power management(DPM)enables MPSOC to reduce power and energy consumption by adopting a suitable core configuration for task *** migration avoids peak temperature values in the multicore *** utilization factor(ui)on central processing unit(CPU)core consumes more energy and increases the temperature *** technique switches the core bymigrating such task to a core that has less temperature and is in a low power *** proposed EA-EDF scheduling technique migrates load on different cores to attain stability in temperature among multiple cores of the CPU and optimized the duration of the idle and sleep periods to enable the low-temperature *** effectiveness of the EA-EDF approach reduces the utilization and energy consumption compared to other existing methods and *** simulation results show the improvement in performance by optimizing 4.8%on u_(i) 9%,16%,23%and 25%at 520 MHz operating frequency as compared to other energy-aware techniques for MPSoCs when the least number of tasks is in running state and can
Nowadays,Wireless Sensor Network(WSN)is a modern technology with a wide range of applications and greatly attractive benefits,for example,self-governing,low expenditure on execution and data communication,long-term fu...
详细信息
Nowadays,Wireless Sensor Network(WSN)is a modern technology with a wide range of applications and greatly attractive benefits,for example,self-governing,low expenditure on execution and data communication,long-term function,and unsupervised access to the *** Internet of Things(IoT)is an attractive,exciting *** applying communication technologies in sensors and supervising features,WSNs have initiated communication between the IoT *** IoT offers access to the highest amount of information collected through WSNs,it leads to privacy management ***,this paper provides a Logistic Regression machine learning with the Elliptical Curve Cryptography technique(LRECC)to establish a secure IoT structure for preventing,detecting,and mitigating *** approach uses the Elliptical Curve Cryptography(ECC)algorithm to generate and distribute security *** algorithm is a light weight key;thus,it minimizes the routing ***,the Logistic Regression machine learning technique selects the transmitter based on intelligent *** main application of this approach is smart *** approach provides continuing reliable routing paths with small *** addition,route nodes cooperate with IoT,and it handles the resources proficiently and minimizes the 29.95%delay.
In the context of online news outlets like Twitter, our work gives a summary of the situation as of rumor identification utilizing visual content. The majority of studies in the literature use visual content to illust...
详细信息
EHR was a statistical database of electronic health records for individuals or demographics that can be accessed through diverse healthcare environments. Planning for long-term retention and handling of electronic hea...
详细信息
暂无评论