Cardiovascular diseases are the world’s leading cause of death;therefore cardiac health of the human heart has been a fascinating topic for *** electrocardiogram(ECG)signal is a comprehensive non-invasive method for ...
详细信息
Cardiovascular diseases are the world’s leading cause of death;therefore cardiac health of the human heart has been a fascinating topic for *** electrocardiogram(ECG)signal is a comprehensive non-invasive method for determining cardiac *** health practitioners use the ECG signal to ascertain critical information about the human *** this article,swarm intelligence approaches are used in the biomedical signal processing sector to enhance adaptive hybrid filters and empirical wavelet transforms(EWTs).At first,the white Gaussian noise is added to the input ECG signal and then applied to the *** ECG signals are denoised by the proposed adaptive hybrid *** honey badge optimization(HBO)algorithm is utilized to optimize the EWT window function and adaptive hybrid filter weight *** proposed approach is simulated by MATLAB 2018a using the MIT-BIH dataset with white Gaussian,electromyogram and electrode motion artifact noises.A comparison of the HBO approach with recursive least square-based adaptive filter,multichannel least means square,and discrete wavelet transform methods has been done in order to show the efficiency of the proposed adaptive hybrid *** experimental results show that the HBO approach supported by EWT and adaptive hybrid filter can be employed efficiently for cardiovascular signal denoising.
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ...
详细信息
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computercommunication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de...
详细信息
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computercommunication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.
Efficient botnet detection is of great security importance and has been the focus of researchers in recent years. Botnet detection is also a difficult task due to the difficulty in distinguishing it from normal traffi...
详细信息
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th...
详细信息
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from the voice signal. However, until now, most techniques have been limited to classifying whether a voice is normal or abnormal. It is crucial that the trained Artificial Intelligence (AI) be able to identify the exact pathology associated with voice for implementation in a realistic environment. Another issue is the need to suppress the ambient noise that could be mixed up with the spectra of the voice. Current work proposes a robust, less time-consuming and non-invasive technique for the identification of pathology associated with a laryngeal voice signal. More specifically, a two-stage signal filtering approach that encompasses a score-based geometric approach and a glottal inverse filtering method is applied to the input voice signal. The aim here is to estimate the noise spectra, to regenerate a clean signal and finally to deliver a completely fundamental glottal flow-derived signal. For the next stage, clean glottal derivative signals are used in the formation of a novel fused-scalogram which is currently referred to as the "Combinatorial Transformative Scalogram (CTS)." The CTS is a time-frequency domain plot which is a combination of two time-frequency scalograms. There is a thorough investigation of the performance of the two individual scalograms as well as that of the CTS *** classification metrics are used to investigate performance, which are: sensitivity, mean accuracy, error, precision, false positive rate, specificity, Cohen’s kappa, Matthews Correlation Coefficient, and F1 score. Implementation of the VOice ICar fEDerico II (VOICED) standard database provided the highest mean accuracy of 94.12% with a sensitivity of 93.85% and a specificity of 97.96% against other existing techniques. The current method performed well despite the d
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
In real-world scenarios, speech signals are often corrupted by various types of noise, which can significantly degrade the intelligibility and quality of the speech. Noise in such environments is highly non-stationary...
详细信息
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, prov...
详细信息
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, providing more flexible services, and reducing network capital and operational costs. However, it also poses new challenges that need to be addressed. A challenging problem with NFV is resource management, since the resources required by each virtualized network function (VNF) change with dynamic traffic variations, requiring automatic scaling of VNF resources. Due to the resource consumption importance, it is essential to propose an efficient resource auto-scaling method in the NFV networks. Inadequate or excessive utilization of VNF resources can result in diminished performance of the entire service chain, thereby affecting network performance. Therefore, predicting VNF resource requirements is crucial for meeting traffic demands. VNF behavior in networks is complex and nonlinear, making it challenging to model. By incorporating machine learning methods into resource prediction models, network service performance can be improved by addressing this complexity. As a result, this paper introduces a new auto-scaling architecture and algorithm to tackle the predictive VNF problem. Within the proposed architecture, there is a predictive VNF auto-scaling engine that comprises two modules: a predictive task scheduler and a predictive VNF auto-scaler. Furthermore, a prediction engine with a VNF resource predictor module has been designed. In addition, the proposed algorithm called GPAS is presented in three phases, VNF resource prediction using genetic programming (GP) technique, task scheduling and decision-making, and auto-scaling execution. The GPAS method is simulated in the KSN framework, a network environment based on NFV/SDN. In the evaluation results, the GPAS method shows better performance in SLA violation rate, resource usage, and response time when co
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl...
详细信息
As modern communicationtechnology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communicationtechnology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
暂无评论