Text detection in natural images is a crucial task for extracting and recognizing valuable information, but it comes with significant challenges. Traditional image processing methods often rely on synthetic features, ...
详细信息
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre...
详细信息
In recent years,cloud computing has provided a Software As A Service(SaaS)platform where the software can be reused and applied to fulfill compli-cated user demands according to specific Quality of Services(QoS)*** user...
详细信息
In recent years,cloud computing has provided a Software As A Service(SaaS)platform where the software can be reused and applied to fulfill compli-cated user demands according to specific Quality of Services(QoS)*** user requirements are formulated as a workflow consisting of a set of ***,many services may satisfy the functionality of each task;thus,searching for the composition of the optimal service while maximizing the QoS is formulated as an NP-hard *** work will introduce a hybrid Artificial Bee Colony(ABC)with a Cuckoo Search(CS)algorithm to untangle service composition *** ABC is a well-known metaheuristic algorithm that can be applied when dealing with different NP-hard problems with an outstanding record of ***,the ABC suffers from a slow convergence ***,the CS is used to overcome the ABC’s limitations by allowing the abandoned bees to enhance their search and override the local *** proposed hybrid algorithm has been tested on 19 datasets and then compared with two standard algorithms(ABC and CS)and three state-of-the-art swarm-based composition *** addition,extensive parameter study experiments were conducted to set up the proposed algorithm’s *** results indicate that the proposed algorithm outperforms the standard algorithms in the three comparison criteria(bestfitness value,averagefitness value,and average execution time)overall datasets in 30 different ***,the proposed algorithm also exhibits better performance than the state–of–the–art algorithms in the three comparison criteria over 30 different runs.
The use of Amazon Web Services is growing rapidly as more users are adopting the *** has various functionalities that can be used by large corporates and individuals as *** analysis is used to build an intelligent sys...
详细信息
The use of Amazon Web Services is growing rapidly as more users are adopting the *** has various functionalities that can be used by large corporates and individuals as *** analysis is used to build an intelligent system that can study the opinions of the people and help to classify those related *** this research work,sentiment analysis is performed on the AWS Elastic Compute Cloud(EC2)through Twitter *** data is managed to the EC2 by using elastic load *** collected data is subjected to preprocessing approaches to clean the data,and then machine learning-based logistic regression is employed to categorize the sentiments into positive and negative *** accuracy of 94.17%is obtained through the proposed machine learning model which is higher than the other models that are developed using the existing algorithms.
With the advancing technology, the increase in threats has been exponential. These technologies have led to the production of huge amounts of network traffic data. Therefore, it is of immense importance for the compan...
详细信息
In the evolving landscape of cybersecurity, effective Intrusion Detection Systems (IDS) are essential for protecting against increasingly sophisticated cyber threats. This study explores the efficacy of various neural...
详细信息
In this study,twelve machine learning(ML)techniques are used to accurately estimate the safety factor of rock slopes(SFRS).The dataset used for developing these models consists of 344 rock slopes from various open-pit...
详细信息
In this study,twelve machine learning(ML)techniques are used to accurately estimate the safety factor of rock slopes(SFRS).The dataset used for developing these models consists of 344 rock slopes from various open-pit mines around Iran,evenly distributed between the training(80%)and testing(20%)*** models are evaluated for accuracy using Janbu's limit equilibrium method(LEM)and commercial tool GeoStudio *** assessment metrics show that the random forest model is the most accurate in estimating the SFRS(MSE=0.0182,R2=0.8319)and shows high agreement with the results from the LEM *** results from the long-short-term memory(LSTM)model are the least accurate(MSE=0.037,R2=0.6618)of all the models ***,only the null space support vector regression(NuSVR)model performs accurately compared to the practice mode by altering the value of one parameter while maintaining the other parameters *** is suggested that this model would be the best one to use to calculate the SFRS.A graphical user interface for the proposed models is developed to further assist in the calculation of the SFRS for engineering *** this study,we attempt to bridge the gap between modern slope stability evaluation techniques and more conventional analysis methods.
This work focuses on the problem of distributed optimization in multi-agent cyberphysical systems, where a legitimate agent's iterates are influenced both by the values it receives from potentially malicious neigh...
详细信息
With the advancing technology, it becomes difficult to cope up with novel trends and configurations. Similarly, it is difficult to secure the systems against each emerging threat. With this the loopholes in convention...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
暂无评论