Accurate and efficient land-use classification is important for the formulation of plans by urban planners, environmental monitoring, and even sustainable development. The paper explores the use of transfer learning m...
详细信息
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs...
详细信息
In the evolving landscape of smart cities, employment strategies have been steering towards a more personalized approach, aiming to enhance job satisfaction and boost economic efficiency. This paper explores an advanc...
详细信息
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart *** power is one of the most significant resources in *** enhancing a power factor,the clustering tech...
详细信息
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart *** power is one of the most significant resources in *** enhancing a power factor,the clustering techniques are *** the forward of data in WSN,more power is *** the existing system,it works with Load Balanced Cluster-ing Method(LBCM)and provides the lifespan of the network with scalability and *** the existing system,it does not deal with end-to-end delay and deliv-ery of *** overcoming these issues in WSN,the proposed Genetic Algo-rithm based on Chicken Swarm Optimization(GA-CSO)with Load Balanced Clustering Method(LBCM)is *** Algorithm generates chromosomes in an arbitrary method then the chromosomes values are calculated using Fitness *** Swarm Optimization(CSO)helps to solve the complex opti-mization ***,it consists of chickens,hens,and *** divides the chicken into *** Balanced Clustering Method(LBCM)maintains the energy during communication among the sensor nodes and also it balances the load in the *** proposed GA-CSO with LBCM improves the life-span of the ***,it minimizes the energy consumption and also bal-ances the load over the *** proposed method outperforms by using the following metrics such as energy efficiency,ratio of packet delivery,throughput of the network,lifetime of the sensor ***,the evaluation result shows the energy efficiency that has achieved 83.56%and the delivery ratio of the packet has reached 99.12%.Also,it has attained linear standard deviation and reduced the end-to-end delay as 97.32 ms.
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
Visual question answering (VQA) aims at predicting an answer to a natural language question associated with an image. This work focuses on two important issues pertaining to VQA, which is a complex multimodal AI task:...
详细信息
Gait recognition is an active research area that uses a walking theme to identify the subject *** Gait Recognition(HGR)is performed without any cooperation from the ***,in practice,it remains a challenging task under ...
详细信息
Gait recognition is an active research area that uses a walking theme to identify the subject *** Gait Recognition(HGR)is performed without any cooperation from the ***,in practice,it remains a challenging task under diverse walking sequences due to the covariant factors such as normal walking and walking with wearing a ***,over the years,have worked on successfully identifying subjects using different techniques,but there is still room for improvement in accuracy due to these covariant *** paper proposes an automated model-free framework for human gait recognition in this *** are a few critical steps in the proposed ***,optical flow-based motion region esti-mation and dynamic coordinates-based cropping are *** second step involves training a fine-tuned pre-trained MobileNetV2 model on both original and optical flow cropped frames;the training has been conducted using static *** third step proposed a fusion technique known as normal distribution serially *** the fourth step,a better optimization algorithm is applied to select the best features,which are then classified using a Bi-Layered neural *** publicly available datasets,CASIA A,CASIA B,and CASIA C,were used in the experimental process and obtained average accuracies of 99.6%,91.6%,and 95.02%,*** proposed framework has achieved improved accuracy compared to the other methods.
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM...
详细信息
作者:
Yesankar, PrajyotGourshettiwar, PalashGote, PradnyawantJiet, Moses MakueiGadkari, Ayush
Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Data Science Maharashtra Wardha442001 India
The design of wireless mobile devices of the next generation 5G promises to address the demands of complex IOT designs in terms of connectivity technologies. This The study illuminates the architecture, benefits, and ...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business req...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive ***,such benefits lead to a more adverse environment entailing network breakdown,systems paralysis,and online banking fraudulence and *** one of the most common and dangerous threats in SDN,probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities,which is thenmanipulated to undermine the entire ***,high performance,and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time,optimize prediction performance,and provide a holistic understanding of machine learning *** the extension of astute machine learning algorithms into an Intrusion Detection System(IDS)through SDN has garnered much scholarly attention within the past decade,this study recommended an effective IDS under the Grey-wolf optimizer(GWO)and Light Gradient Boosting Machine(Light-GBM)classifier for probe attack *** InSDN dataset was employed to train and test the proposed IDS,which is deemed to be a novel benchmarking dataset in *** proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within *** results revealed that the proposed IDS outperforms the state-of-the-art IDSs,as it achieved 99.8%accuracy,99.7%recall,99.99%precision,and 99.8%F-measure.
暂无评论