Rank aggregation is the combination of several ranked lists from a set of candidates to achieve a better ranking by combining information from different sources. In feature selection problem, due to the heterogeneity ...
详细信息
The UAV-assisted wireless network is envisioned as a key player in the sixth generation (6G) wireless systems. One of the most challenging tasks to make it practically viable is to deploy UAVs considering user density...
详细信息
作者:
Kumar, G. MuthuHemanand, D.
Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India
Department of Computer Science and Engineering Tamil Nadu Chennai India
The field of artificial intelligence (AI) has seen significant advancements in recent years. These days, artificial intelligence (AI) tools are being utilized by organizations in both the public and commercial sectors...
详细信息
ISBN:
(纸本)9798350375237
The field of artificial intelligence (AI) has seen significant advancements in recent years. These days, artificial intelligence (AI) tools are being utilized by organizations in both the public and commercial sectors all over the world. Individuals, organizations, and society as a whole will reap broad and significant advantages as a result of the capabilities of artificial intelligence (AI) both today and in the near future. Nevertheless, these very same technical advancements give rise to significant concerns, such as the question of how to ensure that artificial intelligence technology is built and implemented in a manner that is in accordance with the applicable data privacy laws and standards. The fast development of artificial intelligence presents substantial hurdles in terms of protecting customers' privacy and the confidentiality of their data. The purpose of this essay is to suggest an all-encompassing strategy for the development of a framework to solve these concerns. First, an overview of prior research on security and privacy in artificial intelligence is presented, with an emphasis on both the progress that has been made and the limits that still remain. In the same vein, open research topics and gaps that need to be addressed in order to improve existing frameworks are recognized. Regarding the development of the framework, the topic of data protection in artificial intelligence is discussed. This includes elaborating on the significance of protecting the data that is utilized in artificial intelligence models, as well as elaborating on the policies and practices that are in place to ensure the data's safety and the methods that are utilized to maintain the data's integrity. Additionally, the security of artificial intelligence is investigated, which includes an analysis of the vulnerabilities and dangers that are present in artificial intelligence systems, as well as the presentation of instances of potential assaults and malevolent manipulations,
Unstructured Numerical Image dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
In this work, VoteDroid a novel fine-tuned deep learning models-based ensemble voting classifier has been proposed for detecting malicious behavior in Android applications. To this end, we proposed adopting the random...
详细信息
The right partner and high innovation speed are crucial for a successful research and development (R&D) alliance in the high-tech industry. Does homogeneity or heterogeneity between partners benefit innovation spe...
详细信息
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical ***,existing models struggle to efficiently extract features from medical images and may squander additional in...
详细信息
Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical ***,existing models struggle to efficiently extract features from medical images and may squander additional information resources for illness *** address these issues,a deep three‐dimensional convolutional neural network incorporating multi‐task learning and attention mechanisms is *** upgraded primary C3D network is utilised to create rougher low‐level feature *** introduces a new convolution block that focuses on the structural aspects of the magnetORCID:ic resonance imaging image and another block that extracts attention weights unique to certain pixel positions in the feature map and multiplies them with the feature map ***,several fully connected layers are used to achieve multi‐task learning,generating three outputs,including the primary classification *** other two outputs employ backpropagation during training to improve the primary classification *** findings show that the authors’proposed method outperforms current approaches for classifying AD,achieving enhanced classification accuracy and other in-dicators on the Alzheimer's disease Neuroimaging Initiative *** authors demonstrate promise for future disease classification studies.
Based on an open-source software-powered peer-to-peer payment mechanism, Bitcoin is a digital currency that operates independently of a central bank. Its advantages over fiat money include cheaper transaction costs, i...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in order to prolong network lifetime;owing to resource-constrained nature of *** fundamental requirement of any network is routing a packet from its source to *** of a routing algorithm depends on the number of network parameters utilized by that routing *** the recent years,various routing protocol has been developed for the delay tolerant networks(DTN).A routing protocol known as spray and wait(SnW)is one of the most widely used routing algorithms for *** this paper,we study the SnW routing protocol and propose a modified version of it referred to as Pentago SnW which is based on pentagonal number *** to binary SnW shows promising results through simulation using real-life scenarios of cars and pedestrians randomly moving on a map.
暂无评论