Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence ...
详细信息
People across the world aspire to settle in urban areas for better opportunities in career, education, and healthcare facilities. The increased proportion of people living in urban areas requires an improvement of sma...
详细信息
Federated Learning (FL) has emerged as a promising approach to address the challenges of data privacy, security, and scalability in Internet of Things (IoT) environments. This paper provides a comprehensive survey of ...
详细信息
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF...
详细信息
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF)mode when it successfully decodes the received message;otherwise,it switches to soft information relaying(SIR)*** benefits of the DF and SIR forwarding strategies are combined to achieve better performance than deploying the DF or SIR strategy ***-form expressions for the outage probability and symbol error rate(SER)are derived for coded cooperative communication with HDFSIR and energy-harvesting ***,we introduce a novel normalized log-likelihood-ratio based soft estimation symbol(NL-SES)mapping technique,which enhances soft symbol accuracy for higher-order modulation,and propose a model characterizing the relationship between the estimated complex soft symbol and the actual high-order modulated ***-more,the hybrid DF-SIR strategy is extended to a distributed Alamouti space-time-coded cooperative *** evaluate the~performance of the proposed HDFSIR strategy,we implement extensive Monte Carlo simulations under varying channel *** demonstrate significant improvements with the hybrid technique outperforming individual DF and SIR strategies in both conventional and distributed Alamouti space-time coded cooperative ***,at a SER of 10^(-3),the proposed NL-SES mapping demonstrated a 3.5 dB performance gain over the conventional averaging one,highlighting its superior accuracy in estimating soft symbols for quadrature phase-shift keying modulation.
The achievement of cloud environment is determined by the efficiency of its load balancing with proper allocation of resources. The proactive forecasting of future workload, accompanied by the allocation of resources,...
详细信息
In this paper, efficient machine learning technique is introduced to develop efficient machine learning model for hate speech recognition from the tweet data. Initially, the tweet data is gathered from the open-source...
详细信息
Cardiovascular disease(CVD)remains a leading global health challenge due to its high mortality rate and the complexity of early diagnosis,driven by risk factors such as hypertension,high cholesterol,and irregular puls...
详细信息
Cardiovascular disease(CVD)remains a leading global health challenge due to its high mortality rate and the complexity of early diagnosis,driven by risk factors such as hypertension,high cholesterol,and irregular pulse *** diagnostic methods often struggle with the nuanced interplay of these risk factors,making early detection *** this research,we propose a novel artificial intelligence-enabled(AI-enabled)framework for CVD risk prediction that integrates machine learning(ML)with eXplainable AI(XAI)to provide both high-accuracy predictions and transparent,interpretable *** to existing studies that typically focus on either optimizing ML performance or using XAI separately for local or global explanations,our approach uniquely combines both local and global interpretability using Local Interpretable Model-Agnostic Explanations(LIME)and SHapley Additive exPlanations(SHAP).This dual integration enhances the interpretability of the model and facilitates clinicians to comprehensively understand not just what the model predicts but also why those predictions are made by identifying the contribution of different risk factors,which is crucial for transparent and informed decision-making in *** framework uses ML techniques such as K-nearest neighbors(KNN),gradient boosting,random forest,and decision tree,trained on a cardiovascular ***,the integration of LIME and SHAP provides patient-specific insights alongside global trends,ensuring that clinicians receive comprehensive and actionable *** experimental results achieve 98%accuracy with the Random Forest model,with precision,recall,and F1-scores of 97%,98%,and 98%,*** innovative combination of SHAP and LIME sets a new benchmark in CVD prediction by integrating advanced ML accuracy with robust interpretability,fills a critical gap in existing *** framework paves the way for more explainable and transparent decision-making in he
Glaucoma is one of the leading causes of visual impairment worldwide. If diagnosed too late, the disease can irreversibly cause severe damage to the optic nerve, resulting in permanent loss of central vision and blind...
详细信息
Glaucoma is one of the leading causes of visual impairment worldwide. If diagnosed too late, the disease can irreversibly cause severe damage to the optic nerve, resulting in permanent loss of central vision and blindness. Therefore, early diagnosis of the disease is critical. Recent advancements in machine learning techniques have greatly aided ophthalmologists in timely and efficient diagnosis through the use of automated systems. Training the machine learning models with the most informative features can significantly enhance their performance. However, selecting the most informative feature subset is a real challenge because there are 2n potential feature subsets for a dataset with n features, and the conventional feature selection techniques are also not very efficient. Thus, extracting relevant features from medical images and selecting the most informative is a challenging task. Additionally, a considerable field of study has evolved around the discovery and selection of highly influential features (characteristics) from a large number of features. Through the inclusion of the most informative features, this method has the potential to improve machine learning classifiers by enhancing their classification performance, reducing training and testing time, and lowering system diagnostic costs by incorporating the most informative features. This work aims in the same direction to propose a unique, novel, and highly efficient feature selection (FS) approach using the Whale Optimization Algorithm (WOA), the Grey Wolf Optimization Algorithm (GWO), and a hybridized version of these two metaheuristics. To the best of our knowledge, the use of these two algorithms and their amalgamated version for FS in human disease prediction, particularly glaucoma prediction, has been rare in the past. The objective is to create a highly influential subset of characteristics using this approach. The suggested FS strategy seeks to maximize classification accuracy while reducing the t
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security concerns that lie within the container orchestration platforms, especial...
详细信息
暂无评论