The agricultural sector contributes significantly to greenhouse gas emissions, which cause global warming and climate change. Numerous mathematical models have been developed to predict the greenhouse gas emissions fr...
详细信息
In the data retrieval process of the Data recommendation system,the matching prediction and similarity identification take place a major role in the *** that,there are several methods to improve the retrieving process...
详细信息
In the data retrieval process of the Data recommendation system,the matching prediction and similarity identification take place a major role in the *** that,there are several methods to improve the retrieving process with improved accuracy and to reduce the searching ***,in the data recommendation system,this type of data searching becomes complex to search for the best matching for given query data and fails in the accuracy of the query recommendation *** improve the performance of data validation,this paper proposed a novel model of data similarity estimation and clustering method to retrieve the relevant data with the best matching in the big data *** this paper advanced model of the Logarithmic Directionality Texture Pattern(LDTP)method with a Metaheuristic Pattern Searching(MPS)system was used to estimate the similarity between the query data in the entire *** overall work was implemented for the application of the data recommendation *** are all indexed and grouped as a cluster to form a paged format of database structure which can reduce the computation time while at the searching ***,with the help of a neural network,the relevancies of feature attributes in the database are predicted,and the matching index was sorted to provide the recommended data for given query *** was achieved by using the Distributional Recurrent Neural Network(DRNN).This is an enhanced model of Neural Network technology to find the relevancy based on the correlation factor of the feature *** training process of the DRNN classifier was carried out by estimating the correlation factor of the attributes of the *** are formed as clusters and paged with proper indexing based on the MPS parameter of similarity *** overall performance of the proposed work can be evaluated by varying the size of the training database by 60%,70%,and 80%.The parameters that are considered for performance analysis are Precision
作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
The achievement of cloud environment is determined by the efficiency of its load balancing with proper allocation of resources. The proactive forecasting of future workload, accompanied by the allocation of resources,...
详细信息
In recent decades, Cellular Networks (CN) have been used broadly in communication technologies. The most critical challenge in the CN was congestion control due to the distributed mobile environment. Some approaches, ...
详细信息
Sign language recognition is an important social issue to be addressed which can benefit the deaf and hard of hearing community by providing easier and faster communication. Some previous studies on sign language reco...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped *** paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT *** has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device *** IoT network gathers information of interest from multiple cluster members selected by the proposed *** addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT *** analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance *** enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec.
Aflood is a significant damaging natural calamity that causes loss of life and *** work on the construction offlood prediction models intended to reduce risks,suggest policies,reduce mortality,and limit property damage c...
详细信息
Aflood is a significant damaging natural calamity that causes loss of life and *** work on the construction offlood prediction models intended to reduce risks,suggest policies,reduce mortality,and limit property damage caused byfl*** massive amount of data generated by social media platforms such as Twitter opens the door toflood *** of the real-time nature of Twitter data,some government agencies and authorities have used it to track natural catastrophe events in order to build a more rapid rescue ***,due to the shorter duration of Tweets,it is difficult to construct a perfect prediction model for determiningfl*** learning(ML)and deep learning(DL)approaches can be used to statistically developflood prediction *** the same time,the vast amount of Tweets necessitates the use of a big data analytics(BDA)tool forflood *** this regard,this work provides an optimal deep learning-basedflood forecasting model with big data analytics(ODLFF-BDA)based on Twitter *** suggested ODLFF-BDA technique intends to anticipate the existence offloods using tweets in a big data *** ODLFF-BDA technique comprises data pre-processing to convert the input tweets into a usable *** addition,a Bidirectional Encoder Representations from Transformers(BERT)model is used to generate emotive contextual embed-ding from ***,a gated recurrent unit(GRU)with a Multilayer Convolutional Neural Network(MLCNN)is used to extract local data and predict thefl***,an Equilibrium Optimizer(EO)is used tofine-tune the hyper-parameters of the GRU and MLCNN models in order to increase prediction *** memory usage is pull down lesser than 3.5 MB,if its compared with the other algorithm *** ODLFF-BDA technique’s performance was validated using a benchmark Kaggle dataset,and thefindings showed that it outperformed other recent approaches significantly.
A complicated neuro-developmental disorder called Autism Spectrum Disorder (ASD) is abnormal activities related to brain development. ASD generally affects the physical impression of the face as well as the growth of ...
详细信息
Tear film,the outermost layer of the eye,is a complex and dynamic structure responsible for tear *** tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea an...
详细信息
Tear film,the outermost layer of the eye,is a complex and dynamic structure responsible for tear *** tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea and wetting the ocular *** eye syndrome(DES)is a symptomatic disease caused by reduced tear production,poor tear quality,or excessive *** diagnosis is a difficult task due to its multifactorial *** of several clinical tests available,the evaluation of the interference patterns of the tear film lipid layer forms a potential tool for DES *** instrument known as Tearscope Plus allows the rapid assessment of the lipid layer.A grading scale composed of five categories is used to classify lipid layer *** reported work proposes the design of an automatic system employing light weight convolutional neural networks(CNN)and nature inspired optimization techniques to assess the tear film lipid layer patterns by interpreting the images acquired with the Tearscope *** designed framework achieves promising results compared with the existing state-of-the-art techniques.
暂无评论