Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda...
详细信息
Disguised face identification is challenging since people cover their identities by wearing masks, hats, sunglasses, or other disguises. These disguises dramatically modify face features, making identifying individual...
详细信息
In the modern era, large-scale computing systems distribute tasks into smaller units, allowing them to be executed simultaneously, accelerating job completion, and reducing energy usage. However, cloud computing syste...
详细信息
作者:
Murthy, AnanthaPrathwiniKulkarni, SanjeevSavitha, G.Nitte
Karkala Institute of Computer Science and Information Science Srinivas University Department of Master of Computer Applications India
Department of Master of Computer Applications Karkala India Srinivas University
Institute of Engineering and Technology Department of Computer Science and Engineering Mangalore India Manipal Institute of Technology
Manipal Academy of higher Education Manipal Department of Data Science and Computer Applications India
Yakshagana, a traditional theater form from Karnataka, India, features a unique combination of vibrant costumes, dynamic dance movements, and elaborate facial makeup, making character and actor identification a challe...
详细信息
This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented *** proposed approach is a combination of an enhanced grey wolf optimizer(E...
详细信息
This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented *** proposed approach is a combination of an enhanced grey wolf optimizer(EGWO)and an extreme learning machine(ELM).EGWO is an augmented form of the classic grey wolf optimizer(GWO).Compared to standard GWO,EGWO has a better hunting mechanism and produces an optimal *** EGWO was used to optimize the ELM structure and a hybrid model,ELM-EGWO,was *** train and validate the proposed ELM-EGWO model,a sum of 361 experimental results featuring five influencing factors was *** on sensitivity analysis,three distinct cases of influencing parameters were considered to investigate the effect of influencing factors on predictive *** consequences show that the constructed ELM-EGWO achieved the most accurate precision in both training(RMSE=0.0959)and testing(RMSE=0.0912)*** outcomes of the ELM-EGWO are significantly superior to those of deep neural networks(DNN),k-nearest neighbors(KNN),long short-term memory(LSTM),and other hybrid ELMs constructed with GWO,particle swarm optimization(PSO),harris hawks optimization(HHO),salp swarm algorithm(SSA),marine predators algorithm(MPA),and colony predation algorithm(CPA).The overall results demonstrate that the newly suggested ELM-EGWO has the potential to estimate the CS of metakaolin-contained cemented materials with a high degree of precision and robustness.
Parkinson's disease (PD) diagnosis involves the assessment of a variety of motor and non-motor symptoms. To accurately diagnose PD, it is necessary to differentiate its symptoms from those of other conditions. Dur...
详细信息
IoT is a powerful piece of technology that can connect to anything and everyone at anytime, anywhere, and with any service available on a platform or network. The IoT needs to overcome several security and privacy con...
详细信息
In today’s era of cloud computing, modification and tampering of digital images on cloud storage have turn out to be easier due to proliferation of digital image processing tools. Consequently, tamper detection and i...
详细信息
Modern Teaching Methods suggest that the classroom interactions should be more student-centered rather than being teacher-centered. Intelligent Tutoring Systems (ITS) can play a vital role in making education more stu...
详细信息
Malware analysis, is a crucial and cumbersome task, because of the continuously evolving characteristics of malware. Most of the malware damages the system resources or held them hostages for some unreasonable demands...
详细信息
暂无评论