The efforts for data transparency and open government initiatives have resulted in a large amount of data being published on open data portals. These portals are organized to enhance published data accessibility by pr...
详细信息
Skin tones come in a diverse range of shades and are often necessary for various computer vision tasks. While skin detection is a well-studied focus, skin tone classification is not. Most works also use the Fitzpatric...
详细信息
Wearable technology is expanding rapidly in recent year. It is used in many applications in various domains, including affective computing. Affective computing is all about understanding and responding to human emotio...
详细信息
This paper presents a hybrid search based retrieval-augmented generation (RAG) system in the domain of history, in Serbian language. The system was implemented in Python programming language, and is based on Google BE...
详细信息
Body fitness monitoring applications are using mobile sensors to identify human activities. Human activity identification is a challenging task because of the wide availability of human activities. This paper proposes...
详细信息
This study presents a detailed survey on the use of the Internet of Things (IoT) for predictive maintenance and monitoring of cultural heritage, focusing on museums and exhibitions. The integration of IoT in these fie...
详细信息
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques...
详细信息
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques for mining big data to extract the useful and hidden patterns that exist in ***-based clustering techniques have gained significant attention owing to the fact that it helps to effectively recognize complex patterns in spatial *** data clustering is a trivial process owing to the increasing quantity of data which can be solved by the use of Map Reduce *** this motivation,this paper presents an efficient Map Reduce based hybrid density based clustering and classification algorithm for big data analytics(MR-HDBCC).The proposed MR-HDBCC technique is executed on Map Reduce tool for handling the big *** addition,the MR-HDBCC technique involves three distinct processes namely pre-processing,clustering,and *** proposed model utilizes the Density-Based Spatial Clustering of Applications with Noise(DBSCAN)techni-que which is capable of detecting random shapes and diverse clusters with noisy *** improving the performance of the DBSCAN technique,a hybrid model using cockroach swarm optimization(CSO)algorithm is developed for the exploration of the search space and determine the optimal parameters for density based ***,bidirectional gated recurrent neural network(BGRNN)is employed for the classification of big *** experimental validation of the proposed MR-HDBCC technique takes place using the benchmark dataset and the simulation outcomes demonstrate the promising performance of the proposed model interms of different measures.
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security *** study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)*** proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained *** methodology was validated on two benchmark datasets,CICIDS2017 and *** rules were evaluated against conventional Security Information and Event Management systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation *** results demonstrate that xAI-derived rules consistently outperform traditional static ***,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get c...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the *** these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From
The Integrated Sensing and Communication (ISAC) system merged with Reconfigurable Intelligent Surface (RIS) has recently received much attention. This paper proposes an intelligent metaheuristic version of Enhanced Ar...
详细信息
暂无评论