Twitter is the best source for sentiment analysis, product reviews, current issues, etc. Sentiment analysis extracts positive and negative opinions from the Twitter data set, and R studio provides the best environment...
详细信息
Potatoes are essential for food production and consumption, but pests and illnesses can cause major economic losses. To quickly identify potato leaf diseases, image processing, computer vision, and deep learning can b...
详细信息
作者:
Vivek, V.Tr, Mahesh
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
The computer system that is used to take attendance online is going to be upgraded as part of this project. This attendance tracking system is able to hold the technology known as facial recognition, which is a useful...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
Wearable technology is expanding rapidly in recent year. It is used in many applications in various domains, including affective computing. Affective computing is all about understanding and responding to human emotio...
详细信息
The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing(S-ELHR),a low latency routing proto-col that aims to provide a stable mechanism for routing in unmanned aerial vehic...
详细信息
The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing(S-ELHR),a low latency routing proto-col that aims to provide a stable mechanism for routing in unmanned aerial vehicles(UAV).The S-ELHR protocol selects a number of network nodes to create a Connected Dominating Set(CDS)using a parameter known as the Stability Metric(SM).The SM considers the node’s energy usage,connectivity time,and node’s *** the highest SM nodes are chosen to form *** node declares a Willingness to indicate that it is prepared to serve as a relay for its neighbors,by employing its own energy state.S-ELHR is a hybrid protocol that stores only partial topological information and routing tables on CDS *** of relying on the routing information at each intermediary node,it uses source routing,in which a route is generated on-demand,and data packets contain the addresses of the nodes the packet will transit.A route recovery technique is additionally utilized,which first locates a new route to the destination before forwarding packets along *** simulation for various network sizes and mobility speeds,the efficiency of S-ELHR is *** findings demonstrate that S-ELHR performs better than Optimized Link State Routing(OLSR)and Energy Enhanced OLSR(EE-OLSR)in terms of packet delivery ratio,end-to-end delay,and energy consumption.
The detection of small lesions on grape leaves plays a pivotal role in the early identification and management of plant diseases, potentially reducing significant agricultural losses. Traditional detection systems, in...
详细信息
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient t...
详细信息
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow *** this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance *** look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a *** are used to assess the proposed *** findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably.
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of rout...
详细信息
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of router nodes within WSNs is a fundamental challenge that significantly impacts network performance and reliability. Researchers have explored various approaches using metaheuristic algorithms to address these challenges and optimize WSN performance. This paper introduces a new hybrid algorithm, CFL-PSO, based on combining an enhanced Fick’s Law algorithm with comprehensive learning and Particle Swarm Optimization (PSO). CFL-PSO exploits the strengths of these techniques to strike a balance between network connectivity and coverage, ultimately enhancing the overall performance of WSNs. We evaluate the performance of CFL-PSO by benchmarking it against nine established algorithms, including the conventional Fick’s law algorithm (FLA), Sine Cosine Algorithm (SCA), Multi-Verse Optimizer (MVO), Salp Swarm Optimization (SSO), War Strategy Optimization (WSO), Harris Hawk Optimization (HHO), African Vultures Optimization Algorithm (AVOA), Capuchin Search Algorithm (CapSA), Tunicate Swarm Algorithm (TSA), and PSO. The algorithm’s performance is extensively evaluated using 23 benchmark functions to assess its effectiveness in handling various optimization scenarios. Additionally, its performance on WSN router node placement is compared against the other methods, demonstrating its competitiveness in achieving optimal solutions. These analyses reveal that CFL-PSO outperforms the other algorithms in terms of network connectivity, client coverage, and convergence speed. To further validate CFL-PSO’s effectiveness, experimental studies were conducted using different numbers of clients, routers, deployment areas, and transmission ranges. The findings affirm the effectiveness of CFL-PSO as it consistently delivers favorable optimization results when compared to existing meth
Ovarian cysts are one of the most common gynecologic disorders encountered in clinical practice. The pelvic computed tomography (CT) scan is a commonly employed examination method used to detect ovarian cyst, which sh...
详细信息
暂无评论