As Internet of Things (IoT) devices leads an significant challenges in securing the systems from cyber-attacks in large-scale IoT networks. Traditional methods faces struggle to precisely detecting the complex intrusi...
详细信息
Lightweight cryptography is now emerging as a new method for providing security to resource-constrained devices. Securing those devices from external hackers during data transmission is now becoming an important issue...
详细信息
In order to maintain sustainable agriculture, it is vital to monitor plant health. Since all species of plants are prone to characteristic diseases, it necessitates regular surveillance to search for any symptoms, whi...
详细信息
Inefficient task scheduling schemes compromise network performance and increase latency for delay intolerant tasks. Cybertwin based 6G services support data logging of operational queries for appropriate resource allo...
详细信息
Advances in Internet-of-Things (IoT) wearable sensors and Edge-Artificial Intelligence (Edge-AI) have enabled practical realizations of Machine Learning (ML)-enabled mobile sensing applications like Human Activity Rec...
详细信息
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ...
详细信息
Video surveillance systems employing closed-circuit television (CCTV) are crucial for public safety. Accurately detecting humans within video frames is a core component of this technology. This knowledge is crucial fo...
详细信息
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimizati...
详细信息
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimization effect and efficiency. Given that the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm(WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. To address the issue of low conversion efficiency in existing polarity conversion approaches, we introduce a fast polarity conversion algorithm(FPCA). Moreover, we present an MPRM circuits area optimization approach that uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. Experimental results demonstrate that the proposed MPRM circuits area optimization approach is effective and can be used as a promising EDA tool.
The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification *** to its importance,numerous studies have been conducted in various...
详细信息
The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification *** to its importance,numerous studies have been conducted in various *** have established several learning methods for writer identification including supervised and unsupervised ***,supervised methods require a large amount of annotation data,which is impossible in most *** the other hand,unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be *** paper introduces an unsupervised writer identification system that analyzes the data and recognizes the writer based on the inter-feature relations of the data to resolve the uncertainty of the features.A pairwise architecturebased Autoembedder was applied to generate clusterable embeddings for handwritten text ***,the trained baseline architecture generates the embedding of the data image,and the K-means algorithm is used to distinguish the embedding of individual *** proposed model utilized the IAM dataset for the experiment as it is inconsistent with contributions from the authors but is easily accessible for writer identification *** addition,traditional evaluation metrics are used in the proposed ***,the proposed model is compared with a few unsupervised models,and it outperformed the state-of-the-art deep convolutional architectures in recognizing writers based on unlabeled data.
The proactive caching technique known as 'predictive caching' attempts to improve file system performance by anticipating and pre-fetching data that is likely to be requested in the future. Conventional cachin...
详细信息
暂无评论