A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
Human activity recognition is a crucial domain in computerscience and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ...
详细信息
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital *** the development of IoT devices,huge amounts of information,including users’private data,are *** ...
详细信息
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital *** the development of IoT devices,huge amounts of information,including users’private data,are *** systems face major security and data privacy challenges owing to their integral features such as scalability,resource constraints,and *** challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data,creating an attractive opportunity for *** address these challenges,artificial intelligence(AI)techniques,such as machine learning(ML)and deep learning(DL),are utilized to build an intrusion detection system(IDS)that helps to secure IoT *** learning(FL)is a decentralized technique that can help to improve information privacy and performance by training the IDS on discrete linked *** delivers an effectual tool to defend user confidentiality,mainly in the field of IoT,where IoT devices often obtain privacy-sensitive personal *** study develops a Privacy-Enhanced Federated Learning for Intrusion Detection using the Chameleon Swarm Algorithm and Artificial Intelligence(PEFLID-CSAAI)*** main aim of the PEFLID-CSAAI method is to recognize the existence of attack behavior in IoT ***,the PEFLIDCSAAI technique involves data preprocessing using Z-score normalization to transformthe input data into a beneficial ***,the PEFLID-CSAAI method uses the Osprey Optimization Algorithm(OOA)for the feature selection(FS)*** the classification of intrusion detection attacks,the Self-Attentive Variational Autoencoder(SA-VAE)technique can be ***,the Chameleon Swarm Algorithm(CSA)is applied for the hyperparameter finetuning process that is involved in the SA-VAE model.A wide range of experiments were conducted to validate the execution of the PEFLID-CSAAI *** simulated outcomes demonstrated that the PEFLID-CSAAI
Brain tumors are ranked highly among the leading causes of cancer-related fatalities. Precise segmentation and quantitative assessment of brain tumors are crucial for effective diagnosis and treatment planning. Howeve...
详细信息
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing...
详细信息
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing *** manual forgery localization is often reliant on forensic *** recent times,machine learning(ML)and deep learning(DL)have shown promising results in automating image forgery ***,the ML-based method relies on hand-crafted ***,the DL method automatically extracts shallow spatial features to enhance the ***,DL-based methods lack the global co-relation of the features due to this performance degradation noticed in several *** the proposed study,we designed FLTNet(forgery localization transformer network)with a CNN(convolution neural network)encoder and transformer-based *** encoder extracts local high-dimensional features,and the transformer provides the global co-relation of the *** the decoder,we have exclusively utilized a CNN to upsample the features that generate tampered mask ***,we evaluated visual and quantitative performance on three standard datasets and comparison with six state-of-the-art *** IoU values of the proposed method on CASIA V1,CASIA V2,and CoMoFoD datasets are 0.77,0.82,and 0.84,*** addition,the F1-scores of these three datasets are 0.80,0.84,and 0.86,***,the visual results of the proposed method are clean and contain rich information,which can be used for real-time forgery *** code used in the study can be accessed through URL:https://***/ajit2k5/Forgery-Localization(accessed on 21 January 2025).
In this study, we propose a novel framework for detecting abnormal events in surveillance videos, a critical yet challenging task in security applications. This research introduces a robust and efficient solution for ...
详细信息
In this paper,a robust and consistent COVID-19 emergency decision-making approach is proposed based on q-rung linear diophantine fuzzy set(q-RLDFS),differential evolutionary(DE)optimization principles,and evidential r...
详细信息
In this paper,a robust and consistent COVID-19 emergency decision-making approach is proposed based on q-rung linear diophantine fuzzy set(q-RLDFS),differential evolutionary(DE)optimization principles,and evidential reasoning(ER)*** proposed approach uses q-RLDFS in order to represent the evaluating values of the alternatives corresponding to the *** optimization is used to obtain the optimal weights of the attributes,and ER methodology is used to compute the aggregated q-rung linear diophantine fuzzy values(q-RLDFVs)of each *** the score values of alternatives are computed based on the aggregated *** alternative with the maximum score value is selected as a better *** applicability of the proposed approach has been illustrated in COVID-19 emergency decision-making system and sustainable energy planning ***,we have validated the proposed approach with a numerical ***,a comparative study is provided with the existing models,where the proposed approach is found to be robust to perform better and consistent in uncertain environments.
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ...
详细信息
Food Infestation Detection is more important for food safety and health concerns. It is a challenging task to separate the grains into infested or non-infested. It is found that in the existing system, there is no eff...
详细信息
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua...
详细信息
暂无评论