In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic al...
详细信息
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic algorithm)in order to improve the image *** proposed technique based on fusing the data from Particle Swarm Optimization(PSO),Cuckoo search,modification of Cuckoo Search(CS McCulloch)and Genetic algorithms are obtained for improving magnetic resonance images(MRIs)*** algorithms are used to compute the accuracy of each method while the outputs are passed to fusion *** order to obtain parts of the points that determine similar membership values,we apply the different rules of incorporation for these *** proposed approach is applied to challenging applications:MRI images,gray matter/white matter of brain segmentations and original black/white images Behavior of the proposed algorithm is provided by applying to different medical *** is shown that the proposed method gives accurate results;due to the decision fusion produces the greatest improvement in classification accuracy.
A dynamic video summarization system detects key parts of the input video to generate its compact representation. The summaries can be used for efficient management of video data. This paper proposes an approach, Vide...
详细信息
Multi-user Augmented Reality (MuAR) allows multiple users to interact with shared virtual objects, facilitated by exchanging environment information. Current MuAR systems rely on 3D point clouds for real-world analysi...
详细信息
A cloud-based Artificial Intelligence (AI) service has recently empowered the Internet of Medical Things (IoMT) in many applications on the remote Human Interaction Recognition of Pervasive Healthcare Monitoring (HIR-...
详细信息
The Internet of Vehicles can include systems that monitor the health of drivers in real-time, detect signs of fatigue or impairment, and provide alerts to ensure safe driving conditions. With the increase in road acci...
详细信息
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides mor...
详细信息
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides more scope in controlling and making such vehicles energy *** existing methods,it is understood that there have been many approaches found to automate safe driving in autonomous and electric vehicles and also their energy ***,the models focus on different aspects *** is need for a comprehensive framework that exploits multiple deep learning models in order to have better control using Artificial Intelligence(AI)on autonomous driving and energy *** this end,we propose an AI-based framework for autonomous electric vehicles with multi-model learning and decision *** focuses on both safe driving in highway scenarios and energy *** deep learning based framework is realized with many models used for localization,path planning at high level,path planning at low level,reinforcement learning,transfer learning,power control,and speed *** reinforcement learning,state-action-feedback play important role in decision *** simulation implementation reveals that the efficiency of the AI-based approach towards safe driving of autonomous electric vehicle gives better performance than that of the normal electric vehicles.
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational technology (OT) environments. The ISERA f...
详细信息
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.
Mobile app developers struggle to prioritize updates by identifying feature requests within user reviews. While machine learning models can assist, their complexity often hinders transparency and trust. This paper pre...
详细信息
In this new generation, cardiac disease is expanding abruptly. The main reason for spreading this disease is the way of life of human beings, such as poor nutrition, absence of activities, medication, smoking, and so ...
详细信息
We prove that throughout the satisfiable phase, the logarithm of the number of satisfying assignments of a random 2-SAT formula satisfies a central limit theorem. This implies that the log of the number of satisfying ...
详细信息
暂无评论