In this paper, a new UWB antenna for the Internet of Things (IoT) based on a left-handed structure is designed. The antenna utilizes a microstrip feeder and consists of a new complementary split ring resonator (CSRR) ...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be em...
详细信息
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of *** quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression *** article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage *** proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data ***,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded *** addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably *** order to generate optimal codebook for LBG,the WSA is applied to *** performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several *** comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods.
Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various *** resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain *** plays a crucial role in the diagn...
详细信息
Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various *** resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain *** plays a crucial role in the diagnosis of brain tumors and the examination of other brain ***,manual assessment of MRI images by radiologists or experts is performed to identify brain tumors and abnormalities in the early stages for timely ***,early diagnosis of brain tumors is intricate,necessitating the use of computerized *** research introduces an innovative approach for the automated segmentation of brain tumors and a framework for classifying different regions of brain *** proposed methods consist of a pipeline with several stages:preprocessing of brain images with noise removal based on Wiener Filtering,enhancing the brain using Principal Component Analysis(PCA)to obtain well-enhanced images,and then segmenting the region of interest using the Fuzzy C-Means(FCM)clustering technique in the third *** final step involves classification using the Support Vector Machine(SVM)*** classifier is applied to various types of brain tumors,such as meningioma and pituitary tumors,utilizing the Contrast-Enhanced Magnetic Resonance Imaging(CE-MRI)*** proposed method demonstrates significantly improved contrast and validates the effectiveness of the classification framework,achieving an average sensitivity of 0.974,specificity of 0.976,accuracy of 0.979,and a Dice Score(DSC)of ***,this method exhibits a shorter processing time of 0.44 s compared to existing *** performance of this method emphasizes its significance when compared to state-of-the-art methods in terms of sensitivity,specificity,accuracy,and *** enhance the method further in the future,it is feasible to standardize the approach by incorporating a set of classifiers to increase the robustness of the brain classi
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
The amount of information nowadays is rapidly growing. Aside from valuable information, information that is unrelated to a target or is meaningless is also growing. Big data and broader digital technologies are consid...
详细信息
Data mining and analytics involve inspecting and modeling large pre-existing datasets to discover decision-making *** agriculture uses datamining to advance agricultural *** farmers aren’t getting the most out of the...
详细信息
Data mining and analytics involve inspecting and modeling large pre-existing datasets to discover decision-making *** agriculture uses datamining to advance agricultural *** farmers aren’t getting the most out of their land because they don’t use precision *** harvest crops without a well-planned recommendation *** crop production is calculated by combining environmental conditions and management behavior,yielding numerical and categorical *** existing research still needs to address data preprocessing and crop categorization/***,statistical analysis receives less attention,despite producing more accurate and valid *** study was conducted on a dataset about Karnataka state,India,with crops of eight parameters taken into account,namely the minimum amount of fertilizers required,such as nitrogen,phosphorus,potassium,and pH *** research considers rainfall,season,soil type,and temperature parameters to provide precise cultivation recommendations for high *** presented algorithm converts discrete numerals to factors first,then reduces ***,the algorithm generates six datasets,two fromCase-1(dataset withmany numeric variables),two from Case-2(dataset with many categorical variables),and one from Case-3(dataset with reduced factor variables).Finally,the algorithm outputs a class membership allocation based on an extended version of the K-means partitioning method with lambda *** presented work produces mixed-type datasets with precisely categorized crops by organizing data based on environmental conditions,soil nutrients,and ***,the prepared dataset solves the classification problem,leading to a model evaluation that selects the best dataset for precise crop prediction.
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations con...
详细信息
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital ***, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.
A reliable and accurate 3D tracking framework is essential for predicting future locations of surrounding objects and planning the observer's actions in numerous applications such as autonomous driving. We propose...
详细信息
With the prevalence of artificial intelligence, people collect data through numerous sensors and use machine learning to create models for intelligent services. However, data privacy and massive data issues are raised...
详细信息
暂无评论