作者:
Nagatomo, TaikiSato, ToshinoriFukuoka University
Department of Electronics Engineering and Computer Science Graduate School of Engineering Fukuoka Japan Fukuoka University
Department of Electronics Engineering and Computer Science Faculty of Engineering Fukuoka Japan
Improving the energy efficiency of battery-powered medical edge devices is a challenge. In this study, we explored electrocardiogram (ECG) feature detection using the Pan-Tompkins algorithm and integrated approximate ...
详细信息
The creation of new approaches to the design and configuration of smart buildings relies heavily on AI tools and Machine Learning (ML) algorithms, particularly optimization techniques. The widespread use of electronic...
详细信息
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have...
详细信息
Diabetes is one of the most common diseases in Jordan. It is the main reason of death among Jordanian adult citizens. Worldwide, 48% of all deaths are due to Diabetes occurred before the age of 70 years. Hence, this r...
详细信息
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat...
详细信息
This study deals with the coordination of surge protection devices (SPD) in photovoltaic systems (PV). A PV farm model was developed in MATLAB Simulink with all the main components, solar panels, converter, grounding ...
详细信息
Dengue shock syndrome (DSS) is an infectious disease that affects millions of people every year all over the world. Early detection of DSS is essential for providing effective therapy and promoting patient recovery. I...
详细信息
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called *** deep learning approaches and the machine learning are c...
详细信息
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called *** deep learning approaches and the machine learning are compared in the proposed system for presenting the methodology that can detect phishing websites via Uniform Resource Locator(URLs)*** legal class is composed of the home pages with no inclusion of login forms in most of the present modern solutions,which deals with the detection of ***,the URLs in both classes from the login page due,considering the representation of a real case scenario and the demonstration for obtaining the rate of false-positive with the existing approaches during the legal login pages provides the test having *** addition,some model reduces the accuracy rather than training the base model and testing the latest *** addition,a feature analysis is performed on the present phishing domains to identify various approaches to using the phishers in the campaign.A new dataset called the MUPD dataset is used for ***,a prediction model,the Dense forward-backwards Long Short Term Memory(LSTM)model(d−FBLSTM),is presented for combining the forward and backward propagation of LSMT to obtain the accuracy of 98.5%on the initiated login URL dataset.
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet...
详细信息
This pilot study focuses on employment of hybrid LMS-ICA system for in-vehicle background noise *** vehicles are nowadays increasingly supporting voice commands,which are one of the pillars of autonomous and SMART ***...
详细信息
This pilot study focuses on employment of hybrid LMS-ICA system for in-vehicle background noise *** vehicles are nowadays increasingly supporting voice commands,which are one of the pillars of autonomous and SMART *** speaker recognition for context-aware in-vehicle applications is limited to a certain extent by in-vehicle back-ground *** article presents the new concept of a hybrid system which is implemented as a virtual *** highly modular concept of the virtual car used in combination with real recordings of various driving scenarios enables effective testing of the investigated methods of in-vehicle background noise *** study also presents a unique concept of an adaptive system using intelligent clusters of distributed next generation 5G data networks,which allows the exchange of interference information and/or optimal hybrid algorithm settings between individual *** average,the unfiltered voice commands were successfully recognized in 29.34%of all scenarios,while the LMS reached up to 71.81%,and LMS-ICA hybrid improved the performance further to 73.03%.
暂无评论