In recent years, Recommender Systems (RS) have experienced significant growth across various sectors. Because of the recent growth of many e-commerce companies and online video services like Netflix, YouTube, Hotstar,...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous *** continuously improves its network functionality to support these *** input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in *** article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial *** technique aims to create long-lasting and secure NextG networks using this extended *** viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this ***,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.
Online Social media facilitate human interaction, information sharing, and opinion expression in digital era. Misinformation, disinformation and propaganda propagate quickly through social media platforms and impacts ...
详细信息
In recent years, microplastics-plastic particles smaller than five millimeters-have become a significant environmental contaminant. These tiny plastic pieces have been found permeating aquatic ecosystems globally, pos...
详细信息
ISBN:
(纸本)9798350364828
In recent years, microplastics-plastic particles smaller than five millimeters-have become a significant environmental contaminant. These tiny plastic pieces have been found permeating aquatic ecosystems globally, posing a threat to marine life upon ingestion. However, identification and quantification of microplastics in seawater samples remains an arduous task. The small size and translucent nature of microplastics makes them difficult to distinguish from natural particulates in seawater under a microscope. This has hindered efforts to accurately monitor microplastic pollution levels in the marine environment. Our goal in this study was to use cutting edge deep learning techniques to create an automated image based system for detecting microplastics in seawater. We chose to employ a generative adversarial network (GAN) architecture for its proven capability in generating highly realistic synthetic images. The GAN model was trained on a dataset of microscope images of microplastics and natural particulates extracted from seawater samples. Coastal seawater samples were first filtered to isolate particulates of a size range containing microplastics. Density separation was then used to separate the plastic microparticles from denser natural particulates. We implemented a deep convolutional GAN with a generator network to produce synthetic microplastic images, and a discriminator network to differentiate real from synthetic images. Through iterative adversarial training, the two networks evolved to produce and accurately classify images of microplastics with a high degree of realism. Advanced image processing techniques were used to enhance the training data. After training, the GAN model was evaluated on an annotated testing dataset of images containing real-world microplastics and natural particulates extracted from seawater. Our proposed GAN-based technique achieved a microplastic classification accuracy of 92.5% on the test set, demonstrating its effectiveness. The
Humanity's long-standing fascination with the celestial realm and its intersection with recent technological advancements has led to CelestLearn AI. It is an interactive portal developed for Astronomical Image Gen...
详细信息
Diffusion models are a remarkably effective way of learning and sampling from a distribution p(x). In posterior sampling, one is also given a measurement model p(y | x) and a measurement y, and would like to sample fr...
详细信息
Diffusion models are a remarkably effective way of learning and sampling from a distribution p(x). In posterior sampling, one is also given a measurement model p(y | x) and a measurement y, and would like to sample from p(x | y). Posterior sampling is useful for tasks such as inpainting, super-resolution, and MRI reconstruction, so a number of recent works have given algorithms to heuristically approximate it;but none are known to converge to the correct distribution in polynomial time. In this paper we show that posterior sampling is computationally intractable: under the most basic assumption in cryptography-that one-way functions exist-there are instances for which every algorithm takes superpolynomial time, even though unconditional sampling is provably fast. We also show that the exponential-time rejection sampling algorithm is essentially optimal under the stronger plausible assumption that there are one-way functions that take exponential time to invert. Copyright 2024 by the author(s)
The continuous advancements in technology make the process of production and dissemination of counterfeit currency easier than ever before. Counterfeit currency may be produced with the intent of making profit, engagi...
详细信息
Hospitals, clinics, pharmaceutical firms, diagnostics centres, pathology labs, insurance companies, and emergency vehicles must be connected in a unified system to better serve patients worldwide with cutting-edge med...
详细信息
Bayesian inference is one method of statistical inference in machine learning. It predicts the probability that a given test belongs to a certain class and is widely used in various applications such as medical diagno...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console *** the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also *** leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious ***,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is *** data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT ***,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT *** is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient ***,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion *** performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed *** experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed *** addition,the proposed work accomplishes high performance compared to other recent rela
暂无评论