The rapid development recently of Community Question Answering (CQA) satisfies users quest for professional and personal knowledge about anything. In CQA, one central issue is to find users with expertise and willingn...
详细信息
This work addresses the instability in asynchronous data parallel optimization. It does so by introducing a novel distributed optimizer which is able to efficiently optimize a centralized model under communication con...
详细信息
This paper proposes Hybrid Feature Selection Approach - Heterogeneous Ensemble of Intelligent Classifiers (HyFSA-HEIC) for intelligent lightweight network intrusion detection system (NIDS). The purpose is to classify ...
详细信息
More recently, there has been an ever-increasing demand for communication network bandwidth in Internet of Things (IoT), while requiring more and more powerful technologies in using scarce spectrum resources. Given th...
详细信息
More recently, there has been an ever-increasing demand for communication network bandwidth in Internet of Things (IoT), while requiring more and more powerful technologies in using scarce spectrum resources. Given the success of big data and artificial intelligence methods in a variety of industrial applications, it is expected that they can be also employed successfully to address the above issue. Cognitive radio networks (CRNs) identified as one of the potential solutions to improve the utilization of scarce radio spectrum resources, enable IoT to be achieved with high-performance. While in CRNs aided IoT systems, dynamic resource allocation is the main task. Then, orthogonal frequency division multiplexing (OFDM) as a multi-carrier parallel radio transmission technology, has been identified as one of the main approaches well-matched for CRNs aided IoT systems. In this paper, motivated by swarm intelligence paradigm, a solution method is proposed by applying an enhanced Jaya algorithm, named S-Jaya, to address the power allocation problem in cognitive OFDM radio networks for IoT. Due to the algorithm-specific parameter-free feature of the proposed Jaya algorithm with fast convergence speed, a satisfactory computational performance would be achieved in handling this problem. The simulation results show that, for the optimization problem with some constraints, the efficiency of spectrum utilization could be further improved through the use of S-Jaya algorithm, while maximizing the total transmission rate with faster convergence speed, compared with some popular algorithms.
We propose the application of a novel sub-ontology extractionmethodology for achieving interoperability and improving the semantic validity of information retrieval in the medical information systems (MIS) domain. The...
详细信息
Internet plays a significant role that it has helped the mankind to be advanced. One of the remarkable applications of Internet is the feature that enables to download any form of data. In order to accomplish it, devi...
详细信息
In our approach, we applied a few modifications to the 50-layered Residual Network. Our preliminary experiments with the Plant-CLEF 2016 dataset showed that the modifications improved classification performance. We ha...
详细信息
In our approach, we applied a few modifications to the 50-layered Residual Network. Our preliminary experiments with the Plant-CLEF 2016 dataset showed that the modifications improved classification performance. We have trained three models based on the modified Residual Network configuration with different combinations of trusted and noisy PlantCLEF 2017 datasets. Using confidence scores extracted from the three models, we have submitted four runs and our methods showed competitive classification performance.
With an increasing usage of social media to exchange, share and store information, cybercriminals also get attracted to it, to take advantage of the network for their illegal and unethical benefits. Fake online accoun...
详细信息
ISBN:
(纸本)9781538641200
With an increasing usage of social media to exchange, share and store information, cybercriminals also get attracted to it, to take advantage of the network for their illegal and unethical benefits. Fake online accounts pop up every day. Spammers are the users behind the screen who share unsolicited and irrelevant texts to a huge number of users with an intent of advertising some product or to make people to click on unsecured links and infecting user's system usually to make money (click bait). They often use Trending topics on social media as a medium to spam. Sometimes, spam and fake trending is created by Spammers and many a times spammers use Trending topics to lure victims into clicking them. Much research has been done and is going on to detect spammers in OSNs. This paper reviews the existing techniques to detect spammers in social media. Our Current study and future work provides an overview of the traditional classifiers, Naïve Bayes, Support Vector and how they are used to detect spam and classify a dataset taken from social media into trending and non-trending topics based spam.
Due to drastic climatic changes and scarcity of water, the need for proper and sustainable irrigation methods is of high demand. The water demand for plants varies from place to place with the changes in soil content,...
详细信息
暂无评论