The notion of edge computing has recently arisen as a potentially helpful advancement in distributed computing and communication infrastructure. To better understand the evolution and diffusion of technological knowle...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device *** home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical *** paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in *** have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT *** system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing *** have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache *** feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time *** is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation ***,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber *** trial results support the proposed system and demonstrate its potential for use in everyday life.
At a time when technology is spreading rapidly and widely, technology has become a necessity in daily life and practical life, and this led to the emergence of many cyber-physical systems (CPS), among which the medica...
详细信息
Stock market’s volatile and complex nature makes it difficult to predict the market situation. Deep Learning is capable of simulating and analyzing complex patterns in unstructured data. Deep learning models have app...
详细信息
To learn and analyze graph-structured data, Graph Neural Networks (GNNs) have emerged as a powerful framework over traditional neural networks, which work well on grid-like or sequential structure data. GNNs are parti...
详细信息
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy ...
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy *** learning(FL) enhances RS's privacy by enabling model training on decentralized data [2]. Although integrating KG and FL can address both data sparsity and privacy issues in RSs [3], several challenges persist. CH1,Each client's local model relies on a consistent global model from the server, limiting personalized deployment to endusers.
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering *** proposed version employs a network-based reputation system to select the best and most secure path to a *** achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation *** minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation ***,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast *** proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other *** the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing *** paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different ***,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
Brain hemorrhage is a serious and life-threatening condition. It cancause permanent and lifelong disability even when it is not fatal. The wordhemorrhage denotes leakage of blood within the brain and this leakage ofbl...
详细信息
Brain hemorrhage is a serious and life-threatening condition. It cancause permanent and lifelong disability even when it is not fatal. The wordhemorrhage denotes leakage of blood within the brain and this leakage ofblood from capillaries causes stroke and adequate supply of oxygen to thebrain is hindered. Modern imaging methods such as computed tomography(CT) and magnetic resonance imaging (MRI) are employed to get an idearegarding the extent of the damage. An early diagnosis and treatment can savelives and limit the adverse effects of a brain hemorrhage. In this case, a deepneural network (DNN) is an effective choice for the early identification andclassification of brain hemorrhage for the timely recovery and treatment of anaffected person. In this paper, the proposed research work is divided into twonovel approaches, where, one for the classification and the other for volumecalculation of brain hemorrhage. Two different datasets are used for twodifferent techniques classification and volume. A novel algorithm is proposedto calculate the volume of hemorrhage using CT scan images. In the firstapproach, the ‘RSNA’ dataset is used to classify the brain hemorrhage typesusing transfer learning and achieved an accuracy of 93.77%. Furthermore,in the second approach, a novel algorithm has been proposed to calculate thevolume of brain hemorrhage and achieved tremendous results as 1035.91mm3and 9.25 cm3, using the PhysioNet CT scan tomography dataset.
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing works on Arabic ABSA content separately address them,assume that aspect terms are preidentified,or use a pipeline *** solutions design different models for each task,and the output from the ATE model is used as the input to the APC model,which may result in error propagation among different steps because APC is affected by ATE *** methods are impractical for real-world scenarios where the ATE task is the base task for APC,and its result impacts the accuracy of ***,in this study,we focused on a multi-task learning model for Arabic ATE and APC in which the model is jointly trained on two subtasks simultaneously in a *** paper integrates themulti-task model,namely Local Cotext Foucse-Aspect Term Extraction and Polarity classification(LCF-ATEPC)and Arabic Bidirectional Encoder Representation from Transformers(AraBERT)as a shred layer for Arabic contextual text *** LCF-ATEPC model is based on a multi-head selfattention and local context focus mechanism(LCF)to capture the interactive information between an aspect and its ***,data augmentation techniques are proposed based on state-of-the-art augmentation techniques(word embedding substitution with constraints and contextual embedding(AraBERT))to increase the diversity of the training *** paper examined the effect of data augmentation on the multi-task model for Arabic *** experiments were conducted on the original and combined datasets(merging the original and augmented datasets).Experimental results demonstrate that the proposed Multi-task model outperformed existing APC *** results were obtained by AraBERT and LCF-ATEPC with fusion layer(AR-LCF-ATEPC-Fusion)and the proposed data augmentation
The right partner and high innovation speed are crucial for a successful research and development (R&D) alliance in the high-tech industry. Does homogeneity or heterogeneity between partners benefit innovation spe...
详细信息
暂无评论