VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get c...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the *** these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. from
The appearance of cracks is considered an initial sign of the deterioration of structures such as concrete and brick walls. Crack detection plays an important role in ensuring the safety and durability of structures. ...
详细信息
Skin diseases like acne, psoriasis, eczema, and dermatitis affect millions worldwide. Skin cancer and melanoma are diseases that happen due to exposure to UV radiation. The early detection of skin diseases is crucial ...
详细信息
Consistent efforts have been ongoing to improve the friendliness and reliability of informal dialogue systems. However, most research focuses solely on mimicking human-like answers. Therefore, the interlocutors’ awar...
详细信息
Accurate classification of cassava disease,particularly in field scenarios,relies on object semantic localization to identify and precisely locate specific objects within an image based on their semantic meaning,there...
详细信息
Accurate classification of cassava disease,particularly in field scenarios,relies on object semantic localization to identify and precisely locate specific objects within an image based on their semantic meaning,thereby enabling targeted classification while suppressing rrelevant noise and focusing on key semantic *** advancement of deep convolutional neural networks(CNNs)paved the way for identifying cassava diseases by leveraging salient semantic features and promising high *** study proposes an approach that incorporates three innovative elements to refine feature representation for cassava disease ***,a mutualattention method is introduced to highlight semantic features and suppress irrelevant background features in the feature ***,instance batch normalization(IBN)was employed after the residual unit to construct salient semantic features using the mutualattention method,representing high-quality semantic features in the ***,the RSigELUD activation method replaced the conventional ReLU activation,enhancing the nonlinear mapping capacity of the proposed neural network and further improving fine-grained leaf disease classification performance This approach significantly aided in distinguishing subtle disease manifestations in cassava *** proposed neural network,MAIRNet-101(Mutualattention IBN RSigELUD Neural Network),achieved an accuracy of 95.30%and an F1-score of 0.9531,outperforming EfficientNet-B5 and *** evaluate the generalization capability of MAIRNet,the FGVC-Aircraft dataset was used to train MAIRNet-50,which achieved an accuracy of 83.64%.These results suggest that the proposed algorithm is well suited for cassava leaf disease classification applications and offers a robust solution for advancing agricultural technology.
The securing of clean and sustainable water sources is a fundamental entitlement of individuals and an essential factor in the sustained advancement of societies. Alternative water resources, springs can serve as a pr...
详细信息
作者:
Bakr, Hend A.Salama, Ahmed M.Fares, AhmedZaky, Ahmed B.Cairo University
Biomedical Engineering Program Faculty of Engineering Giza Egypt Benha University
Computer Systems Engineering Program Faculty of Engineering at Shoubra Banha Egypt
Computer science and information technology Programs Alexandria Egypt Benha University
On leave from Computer Systems Engineering Program Faculty of Engineering at Shoubra Egypt
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a...
详细信息
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies...
详细信息
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies for classification/detection of fake news are content-based,network(propagation)based,or multimodal methods that combine both textual and visual *** introduce here a framework,called FNACSPM,based on sequential pattern mining(SPM),for fake news analysis and *** this framework,six publicly available datasets,containing a diverse range of fake and real news,and their combination,are first transformed into a proper ***,algorithms for SPM are applied to the transformed datasets to extract frequent patterns(and rules)of words,phrases,or linguistic *** obtained patterns capture distinctive characteristics associated with fake or real news content,providing valuable insights into the underlying structures and commonalities of ***,the discovered frequent patterns are used as features for fake news *** framework is evaluated with eight classifiers,and their performance is assessed with various *** experiments were performed and obtained results show that FNACSPM outperformed other state-of-the-art approaches for fake news classification,and that it expedites the classification task with high accuracy.
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** computing has traditionally played an important role in establishing ***,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic ***,IoT networks are vulnerable to unwanted assaults because of their open and shared *** a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is *** this study,we examined the time-related aspects of network traffic *** presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark *** showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score.
As the global population ages, sarcopenia - age-related muscle decline - demands innovative solutions. This paper introduces GRIPPY, a VR grip controller that transforms basic handgrip exercises into immersive, gamifi...
详细信息
暂无评论