This research article investigates stability problems for the type of linear neutral systems involving multiple time delay parameters in state variables and multiple neutral delay parameters in time derivative of stat...
详细信息
This paper presents a novel AI-powered super-resolution technique for real-time video processing, which significantly enhances the visual quality of low-resolution video frames. The proposed framework employs a hybrid...
详细信息
作者:
Pisal, TejasKumar, HemantKumar, PraveenGote, Pradanyawant
Faculty of Engineering & Technology Department of Computer Science & Design Wardha Maharashtra Sawangi442001 India
Faculty of Engineering & Technology Department of Basic Sciences and Humanities Wardha Maharashtra Sawangi442001 India
Faculty of Engineering & Technology Department of Computer Science & Medical Engineering Wardha Maharashtra Sawangi442001 India
Acute sinusitis, often occurring as a consequence of recovering from a cold, presents a significant health concern due to its impact on the interconnected hollow spaces located behind the cheekbones, forehead, and nos...
详细信息
Technology improvements have changed how crimes are solved, which has led to more collaborative study into how criminals act. "Prophet," an additive model-based method for predicting complicated, nonlinear t...
详细信息
Due to the constraints on power supply and limited encryption capability, data security based on physical layer security (PLS) techniques in backscatter communications has attracted a lot of attention. In this work, w...
详细信息
Plant disease classification using machine learning in a real agricultural field environment is a difficult task. Often, an automated plant disease diagnosis method might fail to capture and interpret discriminatory i...
详细信息
Fake news, or information that seemed false with the intention of misleading the public, has been all too common in recent years. By fostering political polarization and scepticism towards the government, the dissemin...
详细信息
A Trombe wall-heating system is used to absorb solar energy to heat *** parameters affect the system performance for optimal *** study evaluated the performance of four machine learning algorithms—linear regression,k...
详细信息
A Trombe wall-heating system is used to absorb solar energy to heat *** parameters affect the system performance for optimal *** study evaluated the performance of four machine learning algorithms—linear regression,k-nearest neighbors,random forest,and decision tree—for predicting the room temperature in a Trombe wall *** accuracy of the algorithms was assessed using R^(2)and root mean squared error(RMSE)*** results demonstrated that the k-nearest neighbors and random forest algorithms exhibited superior performance,with R^(2)and RMSE values of 1 and *** contrast,linear regression and decision tree showed weaker *** findings highlight the potential of advanced machine learning algorithms for accurate room temperature prediction in Trombe wall systems,enabling informed design decisions to enhance energy efficiency.
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h...
详细信息
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world *** proposed model combines Convolutional Neural Networks(CNN),Bidirectional Long Short-Term Memory(BLSTM),Gated Recurrent Units(GRU),and Attention mechanisms into a cohesive *** integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT *** evaluated our model using the RT-IoT2022 dataset,which includes various devices,standard operations,and simulated *** research’s significance lies in the comprehensive evaluation metrics,including Cohen Kappa and Matthews Correlation Coefficient(MCC),which underscore the model’s reliability and predictive *** model surpassed traditional machine learning algorithms and the state-of-the-art,achieving over 99.6%precision,recall,F1-score,False Positive Rate(FPR),Detection Time,and accuracy,effectively identifying specific threats such as Message Queuing Telemetry Transport(MQTT)Publish,Denial of Service Synchronize network packet crafting tool(DOS SYN Hping),and Network Mapper Operating System Detection(NMAP OS DETECTION).The experimental analysis reveals a significant improvement over existing detection systems,significantly enhancing IoT security *** our experimental analysis,we have demonstrated a remarkable enhancement in comparison to existing detection systems,which significantly strength-ens the security standards of *** model effectively addresses the need for advanced,dependable,and adaptable security solutions,serving as a symbol of the power of deep learning in strengthening IoT ecosystems amidst the constantly evolving cyber threat *** achievemen
Deploying Unmanned Aerial Vehicles (UAVs) as aerial base stations enhances the coverage and performance of communication networks in Vehicular Edge Computing (VEC) scenarios. However, due to the limited communication ...
详细信息
暂无评论