This research project focuses on utilizing machine learning techniques to predict loan default among applicants in the context of financial organizations. Loan approval decisions carry substantial risks, and not all a...
详细信息
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single C...
详细信息
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and *** data need a space away fromunauthorized access,modification,or *** requirements are to be fulfilled by digital image watermarking and *** paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication *** introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver *** proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD *** addition,image encryption is implemented based on chaos and DNA *** encrypted watermarked images are then transmitted through the wireless SC-FDMA *** linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted *** subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this *** study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked *** addition,different variants of SC-FDMA bas
— In recent years, time series prediction has become a highly interesting topic in various applied areas, including clinical time series analysis. Hospitals and other clinical healthcare systems collect Electronic He...
详细信息
Apple trees are an agricultural commodity with high economic value that often face serious challenges due to various leaf diseases. Early detection and proper treatment are crucial to reducing economic losses and ensu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical *** a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this *** can result when the selection of features is subject to metaheuristics,which can lead to a wide range of ***,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more *** propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of *** the proposed method,the number of features selected is minimized,while classification accuracy is *** test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
Due to an increase in the load of network, load balancing service, i.e., a service that gives an equal volume of each task assignment to each of the servers in data centers, it is usually performed by the specialized ...
详细信息
Diabetic retinopathy is a critical eye condition that,if not treated,can lead to vision *** methods of diagnosing and treating the disease are time-consuming and ***,machine learning and deep transfer learning(DTL)tec...
详细信息
Diabetic retinopathy is a critical eye condition that,if not treated,can lead to vision *** methods of diagnosing and treating the disease are time-consuming and ***,machine learning and deep transfer learning(DTL)techniques have shown promise in medical applications,including detecting,classifying,and segmenting diabetic *** advanced techniques offer higher accuracy and *** Diagnosis(CAD)is crucial in speeding up classification and providing accurate disease ***,these technological advancements hold great potential for improving the management of diabetic *** study’s objective was to differentiate between different classes of diabetes and verify the model’s capability to distinguish between these *** robustness of the model was evaluated using other metrics such as accuracy(ACC),precision(PRE),recall(REC),and area under the curve(AUC).In this particular study,the researchers utilized data cleansing techniques,transfer learning(TL),and convolutional neural network(CNN)methods to effectively identify and categorize the various diseases associated with diabetic retinopathy(DR).They employed the VGG-16CNN model,incorporating intelligent parameters that enhanced its *** outcomes surpassed the results obtained by the auto enhancement(AE)filter,which had an ACC of over 98%.The manuscript provides visual aids such as graphs,tables,and techniques and frameworks to enhance *** study highlights the significance of optimized deep TL in improving the metrics of the classification of the four separate classes of *** manuscript emphasizes the importance of using the VGG16CNN classification technique in this context.
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha...
详细信息
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This paper aims to develop a color image encryption algorithm that enhances...
详细信息
In the past, a small size microcontroller was needed to control and gather data from resource-constrained electronic devices aimed at Internet of Things (IoT) applications. While the server nodes receive the requests ...
详细信息
暂无评论