The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** u...
详细信息
The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content *** user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social ***,a combination of multiple behaviors in profiling users has yet to be *** research takes a novel approach and explores user intent types based on multidimensional online behavior in information *** research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine *** research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data *** feedback is based on online behavior and practices collected by using a survey *** participants include both males and females from different occupation sectors and different *** data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their *** techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of *** average is computed to identify user intent type *** user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on th
One of themost prominent research areas in informationtechnology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and bat...
详细信息
One of themost prominent research areas in informationtechnology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and battlefield management, and so on. Due to its self-organizing network and simple installation of the network, the researchers have been attracted to pursue research in the various fields of IoTs. However, a huge amount of work has been addressed on various problems confronted by IoT. The nodes densely deploy over critical environments and those are operated on tiny batteries. Moreover, the replacement of dead batteries in the nodes is almost impractical. Therefore, the problem of energy preservation and maximization of IoT networks has become the most prominent research area. However, numerous state-of-The-Art algorithms have addressed this issue. Thus, it has become necessary to gather the information and send it to the base station in an optimized method to maximize the network. Therefore, in this article, we propose a novel quantum-informed ant colony optimization (ACO) routing algorithm with the efficient encoding scheme of cluster head selection and derivation of information heuristic factors. The algorithm has been tested by simulation for various network scenarios. The simulation results of the proposed algorithm show its efficacy over a few existing evolutionary algorithms using various performance metrics, such as residual energy of the network, network lifetime, and the number of live IoT nodes. Impact Statement-Toward IoT-based applications, here we presented the Quantum-inspired ACO clustering algorithm for network lifetime. IoT nodes in the clustering phase choose theirCH through the distance between cluster member IoT nodes and the residual energy. Thus, CH selection reduces the energy consumption of member IoT nodes. Therefore, our significant contributions are summarized as follows. i. Developing Quantum-informed ACO clustered routing algor
Object detection has made a significant leap forward in recent ***,the detection of small objects continues to be a great difficulty for various reasons,such as they have a very small size and they are susceptible to ...
详细信息
Object detection has made a significant leap forward in recent ***,the detection of small objects continues to be a great difficulty for various reasons,such as they have a very small size and they are susceptible to missed detection due to background ***,small object information is affected due to the downsampling *** learning-based detection methods have been utilized to address the challenge posed by small *** this work,we propose a novel method,the Multi-Convolutional Block Attention Network(MCBAN),to increase the detection accuracy of minute objects aiming to overcome the challenge of information loss during the downsampling *** multi-convolutional attention block(MCAB);channel attention and spatial attention module(SAM)that make up MCAB,have been crafted to accomplish small object detection with higher *** have carried out the experiments on the Karlsruhe Institute of technology and Toyota Technological Institute(KITTI)and Pattern Analysis,Statical Modeling and Computational Learning(PASCAL)Visual Object Classes(VOC)datasets and have followed a step-wise process to analyze the *** experiment results demonstrate that significant gains in performance are achieved,such as 97.75%for KITTI and 88.97%for PASCAL *** findings of this study assert quite unequivocally the fact that MCBAN is much more efficient in the small object detection domain as compared to other existing approaches.
Robotic arms are widely used in the automation industry to package and deliver classified objects. When the products are small objects with very similar shapes, such as screwdriver bits with slightly different threads...
详细信息
Enhancement of technology yields more complex time-dependent outcomes for better understanding and analysis. These outcomes generate more complex, unstable, and high-dimensional data from non-stationary environments. ...
详细信息
A smart public transportation system with reliable services addresses urban challenges like traffic congestion, infrastructure maintenance, travel costs, and pollution. As part of smart city initiatives, urban public ...
详细信息
The cellular automaton (CA), a discrete model, is gaining popularity in simulations and scientific exploration across various domains, including cryptography, error-correcting codes, VLSI design and test pattern gener...
详细信息
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,esp...
详细信息
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,especially for users who prefer to remain anonymous,especially on online social networks(OSNs).Moreover,due to the commercialization of online users'data,some service providers sell users'data to third parties at the blind side of the users,which leads to trust issues between users and service *** matters call for a system that gives online users much-needed control and autonomy of their *** the advancement of blockchain technology,many research institutions are experimenting with decentralized technologies to resolve the OSN user dilemma of privacy intrusion against third parties and *** resolve these limitations,we propose RecGuard,a privacy preservation blockchain-based network *** developed two smart contracts,RG-SH and RG-ST,to ensure the security and privacy of user *** RG-SH manages user data,whereas the RGST stores data.A graph convolutional network(GCN)was integrated with the blockchain-based system to detect malicious ***,we implemented our framework prototype on a locally simulated *** analysis and experiment results show that the proposed scheme demonstrates the effectiveness and privacy of users in our framework.
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
暂无评论