Machine learning has been widely used as part of financial markets investment strategies, whether for forecasting the financial assets exchange rate, managing market volatility, or solving different classification pro...
详细信息
In an era when healthcare was becoming increasingly crucial, many developing nations, including Yemen, struggled to provide basic medical services. Nearly half of Yemen's population lacked access to adequate healt...
详细信息
A key component for preserving a WSN's integrity is designing an intrusion detection system (IDS). This article covers several sorts of security threats that may occur in a WSN. It proposes a detection of maliciou...
详细信息
This study proposes methods that can be used to examine and interpret comments that users have made after watching videos on YouTube on a particular topic. YouTube tutorials are very popular among young people. They h...
详细信息
As CMOS technology approaches its physical and technical limits, alternative technologies such as nanotechnology or quantum computing are needed to overcome the challenges of lithography, transistor scaling, interconn...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but aggregates model parameters from each client and therefore protects user’s ***,due to the inherent distributed nature of federated learning,it is more vulnerable under attacks since users may upload malicious data to break down the federated learning *** addition,some recent studies have shown that attackers can recover information merely from ***,there is still lots of room to improve the current federated learning *** this survey,we give a brief review of the state-of-the-art federated learning techniques and detailedly discuss the improvement of federated *** open issues and existing solutions in federated learning are *** also point out the future research directions of federated learning.
Serverless computing has emerged as a promising research subject in computerscience as it grows in favor among developers because of its low cost and elasticity. However, one primary concern that has cropped up in re...
详细信息
In recent times,wireless sensor network(WSN)finds their suitability in several application areas,ranging from military to commercial *** nodes in WSN are placed arbitrarily in the target field,node localization(NL)bec...
详细信息
In recent times,wireless sensor network(WSN)finds their suitability in several application areas,ranging from military to commercial *** nodes in WSN are placed arbitrarily in the target field,node localization(NL)becomes essential where the positioning of the nodes can be determined by the aid of anchor *** goal of any NL scheme is to improve the localization accuracy and reduce the localization error *** this motivation,this study focuses on the design of Intelligent Aquila Optimization Algorithm Based Node Localization Scheme(IAOAB-NLS)for *** presented IAOAB-NLS model makes use of anchor nodes to determine proper positioning of the *** addition,the IAOAB-NLS model is stimulated by the behaviour of *** IAOAB-NLS model has the ability to accomplish proper coordinate points of the nodes in the *** guaranteeing the proficient NL process of the IAOAB-NLS model,widespread experimentation takes place to assure the betterment of the IAOAB-NLS *** resultant values reported the effectual outcome of the IAOAB-NLS model irrespective of changing parameters in the network.
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a hi...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting,vehicle detection,vehicle tracking,and *** of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets,but the process of extracting shadows from moving vehicles in low light of real scenes is *** real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods of poor illumination for shadow extraction of moving vehicles to address the above *** paper offers a robust shadow extraction of moving vehicles and its elimination for vehicle *** method is distributed into two phases:In the first phase,we extract foreground regions using a mixture of Gaussian model,and then in the second phase,with the help of the Gamma correction,intensity ratio,negative transformation,and a combination of Gaussian filters,we locate and remove the shadow region from the foreground *** to the outcomes proposed method with outcomes of an existing method,the suggested method achieves an average true negative rate of above 90%,a shadow detection rate SDR(η%),and a shadow discrimination rate SDR(ξ%)of 80%.Hence,the suggested method is more appropriate for moving shadow detection in real scenes.
The increased quality and human-likeness of AI generated texts has resulted in a rising demand for neural text detectors, i.e. software that is able to detect whether a text was written by a human or generated by an A...
详细信息
暂无评论