Mental health disorders represent a significant challenge in society, requiring immediate attention and comprehensive knowledge to mitigate their widespread impacts. Although considerable research has focused on hub g...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Pulses are one of the most important food crops in the world due to their higher protein content, approximately 21%-25%. Therefore, it is crucial to analyze the crop's quality and impurity levels. Stones, pebbles,...
详细信息
A compact triple band antenna for wearable applications is presented in this paper. The antenna exhibits dual mode operation for ON/OFF body communication. The antenna has a patch like radiation pattern for OFF body c...
详细信息
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial *** study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANE...
详细信息
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial *** study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic *** are wireless networks that are based on mobile devices and may *** distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion *** study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within *** framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real ***-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce *** framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban *** simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and *** results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities.
Berth Allocation Problem (BAP) is a renowned difficult combinatorial optimization problem that plays a crucial role in maritime transportation systems. BAP is categorized as non-deterministic polynomial-time hard (NP-...
详细信息
Mobile technology is developing *** phone technologies have been integrated into the healthcare industry to help medical ***,computer vision models focus on image detection and classification ***2 is a computer vision...
详细信息
Mobile technology is developing *** phone technologies have been integrated into the healthcare industry to help medical ***,computer vision models focus on image detection and classification ***2 is a computer vision model that performs well on mobile devices,but it requires cloud services to process biometric image information and provide predictions to *** leads to increased *** biometrics image datasets on mobile devices will make the prediction faster,but mobiles are resource-restricted devices in terms of storage,power,and computational ***,a model that is small in size,efficient,and has good prediction quality for biometrics image classification problems is *** pre-trained CNN(PCNN)MobileNetV2 architecture combined with a Support Vector Machine(SVM)compacts the model representation and reduces the computational cost and memory *** proposed novel approach combines quantized pre-trained CNN(PCNN)MobileNetV2 architecture with a Support Vector Machine(SVM)to represent models efficiently with low computational cost and *** contributions include evaluating three CNN models for ocular disease identification in transfer learning and deep feature plus SVM approaches,showing the superiority of deep features from MobileNetV2 and SVM classification models,comparing traditional methods,exploring six ocular diseases and normal classification with 20,111 images postdata augmentation,and reducing the number of trainable *** model is trained on ocular disorder retinal fundus image datasets according to the severity of six age-related macular degeneration(AMD),one of the most common eye illnesses,Cataract,Diabetes,Glaucoma,Hypertension,andMyopia with one class *** the experiment outcomes,it is observed that the suggested MobileNetV2-SVM model size is *** testing accuracy for MobileNetV2-SVM,InceptionV3,and MobileNetV2 is 90.11%,86.88%,a
Software-defined networking(SDN) is a trending networking paradigm that focuses on decoupling of the control logic from the data plane. This decoupling brings programmability and flexibility for the network management...
详细信息
Software-defined networking(SDN) is a trending networking paradigm that focuses on decoupling of the control logic from the data plane. This decoupling brings programmability and flexibility for the network management by introducing centralized infrastructure. The complete control logic resides in the controller, and thus it becomes the intellectual and most important entity of the SDN infrastructure. With these advantages, SDN faces several security issues in various SDN layers that may prevent the growth and global adoption of this groundbreaking technology. Control plane exhaustion and switch buffer overflow are examples of such security issues. Distributed denial-of-service(DDoS) attacks are one of the most severe attacks that aim to exhaust the controller’s CPU to discontinue the whole functioning of the SDN network. Hence, it is necessary to design a quick as well as accurate detection scheme to detect the attack traffic at an early stage. In this paper, we present a defense solution to detect and mitigate spoofed flooding DDoS attacks. The proposed defense solution is implemented in the SDN controller. The detection method is based on the idea of an statistical measure — Interquartile Range(IQR). For the mitigation purpose, the existing SDN-in-built capabilities are utilized. In this work, the experiments are performed considering the spoofed SYN flooding attack. The proposed solution is evaluated using different performance parameters, i.e., detection time, detection accuracy, packet_in messages, and CPU utilization. The experimental results reveal that the proposed defense solution detects and mitigates the attack effectively in different attack scenarios.
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprec...
详细信息
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprecedented capabilities that can revolutionize how healthcare services are delivered and experienced. This paper explores the potential of QIoT in the context of smart healthcare, where interconnected quantum-enabled devices and systems create an ecosystem that enhances data security, enables real-time monitoring, and advances medical knowledge. We delve into the applications of quantum sensors in precise health monitoring, the role of quantum communication in secure telemedicine, and the computational power of quantum computing in drug discovery and personalized medicine. We discuss challenges such as technical feasibility, scalability, and regulatory considerations, along with the emerging trends and opportunities in this transformative field. By examining the intersection of quantum technologies and smart healthcare, this paper aims to shed light on the novel approaches and breakthroughs that could redefine the future of healthcare delivery and patient outcomes. IEEE
Stock market’s volatile and complex nature makes it difficult to predict the market situation. Deep Learning is capable of simulating and analyzing complex patterns in unstructured data. Deep learning models have app...
详细信息
暂无评论