Management of vehicular parking in the crowded environment is the indispensable requirement for the smart city scenario. The advent and potential development of information Communication Technologies (ICT) and Interne...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Subspace clustering has shown great potential in discovering the hidden low-dimensional subspace structures in high-dimensional data. However, most existing methods still face the problem of noise distortion and overl...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Many security cameras have been put up in places like airports, roads, and banks for the safety of these public places. These cameras make a lot of video data, and most security camera recordings are only ever seen wh...
详细信息
Older adults are often underserved and marginalized in technology engagement due to their reluctance and the barriers they face in adopting and engaging with mainstream technology. However, Pinxiaoquan, a social featu...
详细信息
Mango farming significantly contributes to the economy,particularly in developing ***,mango trees are susceptible to various diseases caused by fungi,viruses,and bacteria,and diagnosing these diseases at an early stag...
详细信息
Mango farming significantly contributes to the economy,particularly in developing ***,mango trees are susceptible to various diseases caused by fungi,viruses,and bacteria,and diagnosing these diseases at an early stage is crucial to prevent their spread,which can lead to substantial *** development of deep learning models for detecting crop diseases is an active area of research in smart *** study focuses on mango plant diseases and employs the ConvNeXt and Vision Transformer(ViT)*** datasets were *** first,MangoLeafBD,contains data for mango leaf diseases such as anthracnose,bacterial canker,gall midge,and powdery *** second,SenMangoFruitDDS,includes data for mango fruit diseases such as Alternaria,Anthracnose,Black Mould Rot,Healthy,and Stem and *** datasets were obtained from publicly available *** proposed model achieved an accuracy of 99.87%on the MangoLeafBD dataset and 98.40%on the MangoFruitDDS *** results demonstrate that ConvNeXt and ViT models can effectively diagnose mango diseases,enabling farmers to identify these conditions more *** system contributes to increased mango production and minimizes economic losses by reducing the time and effort needed for manual ***,the proposed system is integrated into a mobile application that utilizes the model as a backend to detect mango diseases instantly.
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy ...
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy *** learning(FL) enhances RS's privacy by enabling model training on decentralized data [2]. Although integrating KG and FL can address both data sparsity and privacy issues in RSs [3], several challenges persist. CH1,Each client's local model relies on a consistent global model from the server, limiting personalized deployment to endusers.
The enormous developments of gaming devices as well as mobile apps have increased the demand of bandwidth. Development of wireless applications has been affected because of the insufficient spectrum resources in the 3...
详细信息
Micro-expressions (MEs) are fleeting involuntary facial movements, which occur frequently when people attempt to conceal their emotions. Since human eyesight cannot detect fleeting and slight changes in facial express...
详细信息
暂无评论