Speech-to-Speech translation is attracting increasing attention from researchers due to its potential of easing the communication. It can be leveraged to develop voice user interfaces for important services, such as a...
详细信息
Facial expressions demonstrate the important information about our emotions and show the real intentions. In this study, a novel texture transformation method using graph structures is presented for facial expression ...
详细信息
Accessing complex medical data, especially temporal information, presents a significant challenge for non-technical users, including healthcare professionals not versed in technology or query languages like SPARQL. Th...
详细信息
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous systems(AS).BGP nodes,com...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain *** research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP *** this paper,we propose a blockchain-based trust model for inter-domain *** model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the *** BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective *** incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing *** forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing *** use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust *** with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.
At present,the prediction of brain tumors is performed using Machine Learning(ML)and Deep Learning(DL)*** various ML and DL algorithms are adapted to predict brain tumors to some range,some concerns still need enhance...
详细信息
At present,the prediction of brain tumors is performed using Machine Learning(ML)and Deep Learning(DL)*** various ML and DL algorithms are adapted to predict brain tumors to some range,some concerns still need enhancement,particularly accuracy,sensitivity,false positive and false negative,to improve the brain tumor prediction system ***,this work proposed an Extended Deep Learning Algorithm(EDLA)to measure performance parameters such as accuracy,sensitivity,and false positive and false negative *** addition,these iterated measures were analyzed by comparing the EDLA method with the Convolutional Neural Network(CNN)way further using the SPSS tool,and respective graphical illustrations were *** results were that the mean performance measures for the proposed EDLA algorithm were calculated,and those measured were accuracy(97.665%),sensitivity(97.939%),false positive(3.012%),and false negative(3.182%)for ten *** in the case of the CNN,the algorithm means accuracy gained was 94.287%,mean sensitivity 95.612%,mean false positive 5.328%,and mean false negative 4.756%.These results show that the proposed EDLA method has outperformed existing algorithms,including CNN,and ensures symmetrically improved *** EDLA algorithm introduces novelty concerning its performance and particular activation *** proposed method will be utilized effectively in brain tumor detection in a precise and accurate *** algorithm would apply to brain tumor diagnosis and be involved in various medical diagnoses *** the quantity of dataset records is enormous,then themethod’s computation power has to be updated.
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episo...
详细信息
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episodic resets when a failure *** manual resets are generally unavailable in autonomous robots,we propose a reset-free reinforcement learning algorithm based on multi-state recovery and failure prevention to avoid failure-induced *** multi-state recovery provides robots with the capability of recovering from failures by self-correcting its behavior in the problematic state and,more importantly,deciding which previous state is the best to return to for efficient *** failure prevention reduces potential failures by predicting and excluding possible unsafe actions in specific *** simulations and real-world experiments are used to validate our algorithm with the results showing a significant reduction in the number of resets and failures during the learning.
Disasters can be mitigated by an early warning signal and proper communication within the hazardous environment using the MANET technology. However, the exact prediction of disaster situation is needed for the timely ...
详细信息
In this paper,we discussed the enhanced Kudryashov’s and general projective Riccati equations tech-niques for obtaining exact solutions to the fifth-order nonlinear water wave(FONLWWE)*** the enhanced Kudryashov’s m...
详细信息
In this paper,we discussed the enhanced Kudryashov’s and general projective Riccati equations tech-niques for obtaining exact solutions to the fifth-order nonlinear water wave(FONLWWE)*** the enhanced Kudryashov’s method,we were able to achieve solitary wave and singular soliton ***-shock hybrid wave,singular soliton,and periodic wave solutions were discovered when we em-ployed the general projective Riccati equations *** can say the given methods are effective and powerful for obtaining exact *** findings in this paper are critical for explaining a wide range of scientific and oceanographic applications involving ocean gravity waves and other related phenomena.
暂无评论