Grains are the most important food consumed globally,yet their yield can be severely impacted by pest *** this issue,scientists and researchers strive to enhance the yield-to-seed ratio through effective pest detectio...
详细信息
Grains are the most important food consumed globally,yet their yield can be severely impacted by pest *** this issue,scientists and researchers strive to enhance the yield-to-seed ratio through effective pest detection *** approaches often rely on preprocessed datasets,but there is a growing need for solutions that utilize real-time images of pests in their natural *** study introduces a novel twostep approach to tackle this ***,raw images with complex backgrounds are *** the subsequent step,feature extraction is performed using both hand-crafted algorithms(Haralick,LBP,and Color Histogram)and modified deep-learning *** propose two models for this purpose:PestNet-EF and ***-EF uses an early fusion technique to integrate handcrafted and deep learning features,followed by adaptive feature selection methods such as CFS and Recursive Feature Elimination(RFE).PestNet-LF utilizes a late fusion technique,incorporating three additional layers(fully connected,softmax,and classification)to enhance *** models were evaluated across 15 classes of pests,including five classes each for rice,corn,and *** performance of our suggested algorithms was tested against the IP102 *** demonstrates that the Pestnet-EF model achieved an accuracy of 96%,and the PestNet-LF model with majority voting achieved the highest accuracy of 94%,while PestNet-LF with the average model attained an accuracy of 92%.Also,the proposed approach was compared with existing methods that rely on hand-crafted and transfer learning techniques,showcasing the effectiveness of our approach in real-time pest detection for improved agricultural yield.
Weather variability significantly impacts crop yield, posing challenges for large-scale agricultural operations. This study introduces a deep learning-based approach to enhance crop yield prediction accuracy. A Multi-...
详细信息
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high d...
详细信息
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data *** consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations(SBSs)are deployed in the areas with high User Equipment(UE)*** user centric deployment of mmWave SBSs inevitably incurs correlation between UE and *** a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave *** using tools from stochastic geometry,we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power *** UE clustering we considered Thomas cluster process and derive expressions for the association probability,coverage probability,area spectral efficiency,and energy *** also provide Monte Carlo simulation results to validate the accuracy of the derived ***,we analyze the impact of mmWave operating frequency,antenna gain,small cell biasing,and BSs density to get useful engineering insights into the performance of hybrid mmWave *** results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse *** to their heterogeneous nature and constrained resources...
详细信息
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse *** to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional *** review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT *** intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security *** methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in *** reviewed solutions are categorized based on their ability to tackle specific security *** review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and *** findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data *** paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks.
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ...
详细信息
Graph Neural Networks(GNNs)have become a widely used tool for learning and analyzing data on graph structures,largely due to their ability to preserve graph structure and properties via graph representation ***,the ef...
详细信息
Graph Neural Networks(GNNs)have become a widely used tool for learning and analyzing data on graph structures,largely due to their ability to preserve graph structure and properties via graph representation ***,the effect of depth on the performance of GNNs,particularly isotropic and anisotropic models,remains an active area of *** study presents a comprehensive exploration of the impact of depth on GNNs,with a focus on the phenomena of over-smoothing and the bottleneck effect in deep graph neural *** research investigates the tradeoff between depth and performance,revealing that increasing depth can lead to over-smoothing and a decrease in performance due to the bottleneck *** also examine the impact of node degrees on classification accuracy,finding that nodes with low degrees can pose challenges for accurate *** experiments use several benchmark datasets and a range of evaluation metrics to compare isotropic and anisotropic GNNs of varying depths,also explore the scalability of these *** findings provide valuable insights into the design of deep GNNs and offer potential avenues for future research to improve their performance.
The paper addresses the critical problem of application workflow offloading in a fog environment. Resource constrained mobile and Internet of Things devices may not possess specialized hardware to run complex workflow...
详细信息
暂无评论