Building trust between consumers and service providers is critical to the functioning of cloud computing, a technology that offers a range of services over the Internet. When consumers choose which cloud services to u...
详细信息
Low Earth Orbit Satellite Networks (LSNs) are integral to supporting a broad range of modern applications, which are typically modeled as Service Function Chains (SFCs). Each SFC is composed of Virtual Network Functio...
详细信息
This paper introduces KRATT, a removal and structural analysis attack against state-of-the-art logic locking techniques, such as single and double flip locking techniques (SFLTs and DFLTs). KRATT utilizes powerful qua...
详细信息
Today’s marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will also...
详细信息
Today’s marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will also give them suggestions on how to enhance their offerings. We make an effort to comprehend the relationship between various factors in customer reviews on an online store for women’s clothing. The proposed system also classifies each review, according to, whether it recommends the product in question or not, and whether it has a positive, negative, or neutral sentiment. With the exception of review titles and review texts, we used univariate and multivariate analyses on datasets features to accomplish these goals. Additionally, we have implemented a bidirectional recurrent neural network (RNN) with a long-short term memory unit (LSTM) for sentiment and recommendation.
The Internet of Things(IoT)is gaining attention because of its broad applicability,especially by integrating smart devices for massive communication during sensing ***-assisted Wireless Sensor Networks(WSN)are suitabl...
详细信息
The Internet of Things(IoT)is gaining attention because of its broad applicability,especially by integrating smart devices for massive communication during sensing ***-assisted Wireless Sensor Networks(WSN)are suitable for various applications like industrial monitoring,agriculture,and *** this regard,routing is challenging to nd an efcient path using smart devices for transmitting the packets towards big data repositories while ensuring efcient energy *** paper presents the Robust Cluster Based Routing Protocol(RCBRP)to identify the routing paths where less energy is consumed to enhances the network *** scheme is presented in six phases to explore ow and *** propose the two algorithms:(i)energy-efcient clustering and routing algorithm and (ii)distance and energy consumption calculation *** scheme consumes less energy and balances the load by clustering the smart *** work is validated through extensive simulation using *** elucidate the dominance of the proposed scheme is compared to counterparts in terms of energy consumption,the number of packets received at BS and the number of active and dead *** the future,we shall consider edge computing to analyze the performance of robust clustering.
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho...
详细信息
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the thoracic cavity, causing chest pain, difficulty breathing, and ultimately the complete collapse of the taut lungs. pneumothorax. Therefore, early diagnosis and treatment should be started. Neural networks have proven effective in image classification tasks, and many researchers believe that training neural network models can detect radiologist-diagnosed chest abnormalities such as pneumonia and pneumothorax. is proving. Moreover, we utilize various techniques, including Stochastic Weight Averaging (SWA), aggressive data augmentation, and learning rate schedule. We use the chest x-ray dataset provided by the 2019 SIIM-ACR In this study, a ResNet-34 neural network is trained on a data set of chest x-rays containing over 10,675 images to create a model that predicts the presence of pneumothorax from chest *** suggested system receives a Dice Similarity Coefficient (DSC) of 0.8410
In the 5G/6G era of networking, computational offloading, i.e., the act of transferring resource-intensive computational tasks to separate external devices in the network proximity, constitutes a paradigm shift for mo...
In the 5G/6G era of networking, computational offloading, i.e., the act of transferring resource-intensive computational tasks to separate external devices in the network proximity, constitutes a paradigm shift for mobile task execution on Edge Computing infrastructures. However, in order to provide firm Quality of Service (QoS) assurances for all the involved users, meticulous planning of the offloading decisions should be made, which potentially involves inter-site task transferring. In this paper, we consider a multi-user, multi-site Multi-Access Edge Computing (MEC) infrastructure, where mobile devices (MDs) can offload their tasks to the available edge sites (ESs). Our goal is to minimize end-to-end delay and energy consumption, which constitute the sum cost of the considered system, and comply with the MDs’ application requirements. To this end, we introduce a two-stage Reinforcement Learning (RL)-based mechanism, where the MDs-to-ES task offloading and the ES-to-ES task transferring decisions are iteratively optimized. The proper operation, effectiveness and efficiency of our proposed offloading mechanism is assessed under various evaluation scenarios.
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges f...
详细信息
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making *** overcome this challenge,extracting suggestions from opinionated text is a possible *** this study,the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’reviews.A classification using a word-embedding approach is used via the XGBoost *** two datasets used in this experiment relate to online hotel reviews and Microsoft Windows App Studio discussion reviews.F1,precision,recall,and accuracy scores are *** results demonstrated that the XGBoost classifier outperforms—with an accuracy of more than 80%.Moreover,the results revealed that suggestion keywords and phrases are the predominant features for suggestion ***,this study contributes to knowledge and practice by comparing feature extraction classifiers and identifying XGBoost as a better suggestion mining process for identifying online reviews.
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio...
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automation of the network configuration, while minimizing the human intervention. Specifically, IBN allows users to interact with the network through high-level and declarative requests, called intents, which later can be translated into low-level configurations. IBN can entail different scopes and target network infrastructures, while being domain specific, which can create several challenges in terms of the final activation of the requested intents. To this end, in this paper, we mainly focus on intents that are expressing security and Quality of Service (QoS) network services demands that can be translated into Service Function Chains (SFC) and automatically deployed over a campus network. Our work and depending on the security level expressed in the intent, tries to optimally decide the level of multi-tenancy or complete segregation of the users' services that can be achieved, while satisfying the network provider's objectives. In particular, an artificial intelligence inspired algorithm called Particle Swarm Optimization (PSO) is modeled that automatically tries to find the best placement of the intents, while satisfying the security and QoS requirements of the users issuing the intents.
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one of the most important phases of requirement engineering. We need to perform different elicitation techniques to find out the user's needs. Pre-requirements tracing is the process of determining the origins of a specific demand. Typically, certain needs arise that have no apparent source, but stakeholders will testify to their importance. Such criteria, however, are most likely dependent on tacit or tacit-like information entrenched in the issue domain. Tacit knowledge is one of the most common challenges for requirement analysts. This study contributes to constructing a systematic literature review for exploring multiple ways to model functional requirements using tacit knowledge. We have identified and analyzed 10 studies. In these research papers, different authors have discussed different methods to gather functional requirements from tacit knowledge.
暂无评论