Many applications widely use broadcast communications (BC) due to their efficiency in simultaneously distributing data to many receivers. More specifically, BC is essential in resource-constrained devices (RCDs) for c...
详细信息
The established SDN multi-controller architecture faces the challenge of locating controllers to boost the scalability, reliability, and security of the network. Reliability is one of the important metric to handle wh...
详细信息
The ever-expanding Internet of Things (IoT) landscape poses significant challenges for network reliability and resilience. This research investigates the design and implementation of a resilient Software-Defined Netwo...
详细信息
Crop assessment plays an important role in ensuring food safety, and recent technological advances such as machine learning and deep learning have revolutionized assessment, and crop and culture management. Agriconnec...
详细信息
Recommendation engines leverage past user preferences to forecast their future interests. Many deep learning-based recommendation systems aim to explore the intricate dynamics between users and particular items. Typic...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN *** it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes(SN)in a WSN is always a challenging *** this research paper,Distance Matrix and Markov Chain(DM-MC)model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the *** method further employs a Markov Chain Model(MCM)for energy optimization and interference *** are performed against two well-known models,and the results demonstrate that the proposed algorithm improves performance by using less network resources when compared to the existing *** probability is used in the Markova chain to sustain higher energy ***,the proposed Distance Matrix and Markov Chain model decrease energy use by 31%and 25%,respectively,compared to the existing DV-Hop and CSA *** experimental results were performed against two proven models,Distance VectorHop Algorithm(DV-HopA)and Crow Search Algorithm(CSA),showing that the proposed DM-MC model outperforms both the existing models regarding localization accuracy and Energy Consumption(EC).These results add to the credibility of the proposed DC-MC model as a better model for employing node localization while establishing a WSN framework.
Deep neural networks have emerged as a leading approach for object detection in recent years. However, their intensive computational requirements often make them unsuitable for embedded systems. The TinyYolo network i...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
Music recommendation systems are essential due to the vast amount of music available on streaming platforms,which can overwhelm users trying to find new tracks that match their *** systems analyze users’emotional res...
详细信息
Music recommendation systems are essential due to the vast amount of music available on streaming platforms,which can overwhelm users trying to find new tracks that match their *** systems analyze users’emotional responses,listening habits,and personal preferences to provide personalized suggestions.A significant challenge they face is the“cold start”problem,where new users have no past interactions to guide *** improve user experience,these systems aimto effectively recommendmusic even to such users by considering their listening behavior and music *** paper introduces a novel music recommendation system that combines order clustering and a convolutional neural network,utilizing user comments and rankings as ***,the system organizes users into clusters based on semantic similarity,followed by the utilization of their rating similarities as input for the convolutional neural *** network then predicts ratings for unreviewed music by ***,the system analyses user music listening behaviour and music *** popularity can help to address cold start users as ***,the proposed method recommends unreviewed music based on predicted high rankings and popularity,taking into account each user’s music listening *** proposed method combines predicted high rankings and popularity by first selecting popular unreviewedmusic that themodel predicts to have the highest ratings for each *** these,the most popular tracks are prioritized,defined by metrics such as frequency of listening across *** number of recommended tracks is aligned with each user’s typical listening *** experimental findings demonstrate that the new method outperformed other classification techniques and prior recommendation systems,yielding a mean absolute error(MAE)rate and rootmean square error(RMSE)rate of approximately 0.0017,a hit rate of 82.45%,an average normalized discounted cumulative gain
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** ...
详细信息
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret *** image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding *** this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet *** wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding *** the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret *** lowresolution secret images are combined using densemodules to obtain a high-quality secret *** experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various *** proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical *** conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing *** ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various *** research and experimentation can explore the algorith
暂无评论