Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider sp...
详细信息
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider spread and geographically distributed nodes to support mobility,real-time interaction,and location-based *** provide optimum quality of user life in moderm buildings,we rely on a holistic Framework,designed in a way that decreases latency and improves energy saving and services efficiency with different *** EVent system Specification(DEVS)is a formalism used to describe simulation models in a modular *** this work,the sub-models of connected objects in the building are accurately and independently designed,and after installing them together,we easily get an integrated model which is subject to the fog computing *** results show that this new approach significantly,improves energy efficiency of buildings and reduces ***,with DEVS,we can easily add or remove sub-models to or from the overall model,allowing us to continually improve our designs.
Mental health challenges are growing in recent years, emphasizing the need for effective monitoring and inter- vention systems. This paper presents a comprehensive approach to detect mental unstabilities by analyzing ...
详细信息
Emotions are a vital semantic part of human correspondence. Emotions are significant for human correspondence as well as basic for human–computer cooperation. Viable correspondence between people is possibly achieved...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various frequency bands.A recent wireless communication network uses OFDM in longterm evolution(LTE)and 5G,among *** main problem faced by 5G wireless OFDM is distortion of transmission signals in the *** transmission loss is called peak-to-average power ratio(PAPR).This wireless signal distortion can be reduced using various *** study uses machine learning-based algorithm to solve the problem of PAPR in 5G wireless *** transmit sequence(PTS)helps in the fast transfer of data in wireless *** is merged with deep belief neural network(DBNet)for the efficient processing of signals in wireless 5G *** indicates that the proposed system outperforms other existing ***,PAPR reduction in OFDM by DBNet is optimized with the help of an evolutionary algorithm called particle swarm ***,the specified design supports in improving the proposed PAPR reduction architecture.
Diabetics is the maximum common non-transmissible disease and the deadliest disease worldwide, affecting five hundred and thirty-seven mountain individuals. Diabetics container be carried on by a variety of sources, w...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth...
详细信息
Medical imaging has been used extensively in healthcare in recent years for a variety of purposes, including disease diagnosis, treatment planning, and tracking the course of an illness. These applications entail taki...
详细信息
暂无评论