Understanding the prevalence and severity of accidental falls among the elderly is crucial. Even for those living independently, falls are frequent and can lead to severe injuries, often being a primary cause of elder...
详细信息
The growing spectrum of Generative Adversarial Network (GAN) applications in medical imaging, cyber security, data augmentation, and the field of remote sensing tasks necessitate a sharp spike in the criticality of re...
详细信息
The growing spectrum of Generative Adversarial Network (GAN) applications in medical imaging, cyber security, data augmentation, and the field of remote sensing tasks necessitate a sharp spike in the criticality of review of Generative Adversarial Networks. Earlier reviews that targeted reviewing certain architecture of the GAN or emphasizing a specific application-oriented area have done so in a narrow spirit and lacked the systematic comparative analysis of the models’ performance metrics. Numerous reviews do not apply standardized frameworks, showing gaps in the efficiency evaluation of GANs, training stability, and suitability for specific tasks. In this work, a systemic review of GAN models using the PRISMA framework is developed in detail to fill the gap by structurally evaluating GAN architectures. A wide variety of GAN models have been discussed in this review, starting from the basic Conditional GAN, Wasserstein GAN, and Deep Convolutional GAN, and have gone down to many specialized models, such as EVAGAN, FCGAN, and SIF-GAN, for different applications across various domains like fault diagnosis, network security, medical imaging, and image segmentation. The PRISMA methodology systematically filters relevant studies by inclusion and exclusion criteria to ensure transparency and replicability in the review process. Hence, all models are assessed relative to specific performance metrics such as accuracy, stability, and computational efficiency. There are multiple benefits to using the PRISMA approach in this setup. Not only does this help in finding optimal models suitable for various applications, but it also provides an explicit framework for comparing GAN performance. In addition to this, diverse types of GAN are included to ensure a comprehensive view of the state-of-the-art techniques. This work is essential not only in terms of its result but also because it guides the direction of future research by pinpointing which types of applications require some
In the context of social platforms, this study explores Twitter sentiment analysis, providing practical insights and directions for future research. In previous days, people conveyed their feelings directly, but now p...
详细信息
This project presents an inventive Animal Intrusion Detection System using Yolo v8 object detection algorithm. Addressing the problem of wildlife intrusions in agriculture as its main goal, the presented work focuses ...
详细信息
Symbolic Regression’s vast search space can lead to computational inefficiencies. However, Grammatical Evolution (GE) narrows down the search by focusing on solutions adhering to specific grammar and guiding the algo...
详细信息
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
In this paper, we propose a Smart Pothole Detection System designed to enhance road safety and improve maintenance efficiency through machine learning and geospatial analysis. Using smartphone applications, road image...
详细信息
A Deep Q-Learning approach to Intrusion Detection and Prevention Systems (IDPS) offers a cutting-edge solution for enhancing cybersecurity by leveraging intelligent machine learning models. This method dynamically ada...
详细信息
The precise and effective management of water using Internet of Things (IoT) technology in Automatic Irrigation Systems (AIS) has revolutionized agricultural practices. The primary objective is to enhance the watering...
详细信息
Chronic Kidney Disease (CKD) afflicts approximately 20% of the global population, underscoring the pressing need for precise detection and diagnosis. Accurate kidney segmentation in medical imaging is pivotal for capt...
详细信息
暂无评论