作者:
Petkar, Taniya G.Kumar, PraveenSarate, Kirtiksha U.
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Sawangi Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Design Maharashtra Sawangi Wardha442001 India
By enabling precise, individualized, and effective treatments, the integration of artificial intelligence (AI) and machine learning (ML) into wound and skin healing is revolutionizing healthcare. Artificial intelligen...
详细信息
作者:
Warbhe, Mohan K.Bore, Joy JordanChaudari, Shiv Nath
Faculty of Engineering and Technology Department of Computer Science and Design Maharashtra Sawangi Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Medical Engineering MaharashtraSawangi Wardha442001 India
The proposed web application for tomato leaf disease detection exemplifies the transformative power of Artificial Intelligence and computer Vision in modern agriculture. Addressing the critical issue of early and accu...
详细信息
Temporal ontologies allow to represent not only concepts,their properties,and their relationships,but also time-varying information through explicit versioning of definitions or through the four-dimensional perduranti...
详细信息
Temporal ontologies allow to represent not only concepts,their properties,and their relationships,but also time-varying information through explicit versioning of definitions or through the four-dimensional perdurantist *** are widely used to formally represent temporal data semantics in several applications belonging to different fields(e.g.,Semantic Web,expert systems,knowledge bases,big data,and artificial intelligence).They facilitate temporal knowledge representation and discovery,with the support of temporal data querying and ***,there is no standard or consensual temporal ontology query *** a previous work,we have proposed an approach namedτJOWL(temporal OWL 2 from temporal JSON,where OWL 2 stands for"OWL 2 Web Ontology Language"and JSON stands for"JavaScript Object Notation").τJOWL allows(1)to automatically build a temporal OWL 2 ontology of data,following the Closed World Assumption(CWA),from temporal JSON-based big data,and(2)to manage its incremental maintenance accommodating their evolution,in a temporal and multi-schema-version *** this paper,we propose a temporal ontology query language forτJOWL,namedτSQWRL(temporal SQWRL),designed as a temporal extension of the ontology query language—Semantic Query-enhanced Web Rule Language(SQWRL).The new language has been inspired by the features of the consensual temporal query language TSQL2(Temporal SQL2),well known in the temporal(relational)database *** aim of the proposal is to enable and simplify the task of retrieving any desired ontology version or of specifying any(complex)temporal query on time-varying ontologies generated from time-varying big *** examples,in the Internet of Healthcare Things(IoHT)domain,are provided to motivate and illustrate our proposal.
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p...
详细信息
Blockchain-based Payment Channel Network (PCN) routing for payment transactions includes the transfer of funds between multiple parties through a network of interconnected payment channels. These channels permit off-c...
详细信息
In agriculture, detecting plant diseases is crucial for optimal plant growth. Initially, input images are collected from three datasets: banana leaf spot diseases (BananaLSD) dataset, banana leaf dataset, and PSFD-Mus...
详细信息
This study aims to investigate and propose solutions to traffic information extraction used for state estimation based on traffic data collected from crowd-source. Concretely, a framework to traffic data collection su...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
暂无评论