With the popularization of high-definition video devices, more and more users and video streaming service providers desire to restore early classic videos and deliver classic video contents with improved resolution. H...
详细信息
In an era marked by the proliferation of interconnected devices, the Internet of Things (IoT) has emerged as a revolutionary technological paradigm. IoT networks encompass a vast array of devices, from smart appliance...
详细信息
In an era marked by the proliferation of interconnected devices, the Internet of Things (IoT) has emerged as a revolutionary technological paradigm. IoT networks encompass a vast array of devices, from smart appliances to industrial sensors, revolutionizing industries and everyday life. However, this ubiquitous connectivity has ushered in a new frontier of security challenges, necessitating the deployment of robust Intrusion Detection Systems (IDS). This paper presents a pioneering Multi-Method Stacked Feature Selection (M2SFS) approach-based IDS tailored explicitly for IoT networks. By orchestrating a diverse ensemble of feature selection techniques, the M2SFS framework adept.y curates the feature set derived from the CICIDS 2017 dataset. This comprehensive selection strategy optimally reduces dimensionality, mitigating the resource constraints inherent to IoT ecosystems. The proposed IDS, rooted in the M2SFS approach, demonstrates exceptional accuracy and efficiency in detecting anomalous network behaviors. By harnessing the collective strength of stacked feature selection, this IDS capitalizes on the synergistic potential of multiple feature selection methods. The result is an IDS uniquely adapted to the intricacies of IoT networks, effectively fortifying their security posture. Through rigorous experimentation using the CICIDS 2017 dataset, the proposed approach affirms the superiority of the M2SFS-based IDS over conventional methods. This study underscores the pressing need for IDS in IoT environments and highlights the promise of our innovative approach in safeguarding IoT networks against emerging threats.
Early and accurate segmentation of oral cancer is essential for timely diagnosis and treatment. Traditional methods like visual inspections and biopsies are often subjective and costly, which can hinder early detectio...
详细信息
ISBN:
(数字)9798350357509
ISBN:
(纸本)9798350357516
Early and accurate segmentation of oral cancer is essential for timely diagnosis and treatment. Traditional methods like visual inspections and biopsies are often subjective and costly, which can hinder early detection. To improve segmentation accuracy for binary and multiclass classification, we propose a transformer-based ensemble model that combines Vision Transformer (ViT), Data-efficient Image Transformer (DeiT), Swin Transformer, and BEiT. This ensemble utilizes self-attention mechanisms for better feature extraction and spatial representation. Our study employs two datasets: the MOD dataset (463 images of oral diseases) and a histopathological dataset (1,224 images of oral squamous cell carcinoma and normal epithelium). We applied extensive preprocessing and augmentation techniques, such as grayscale conversion, binary thresholding, and Contrast Limited Adaptive Histogram Equalization (CLAHE), to enhance image quality and model generalization. The performance evaluation showed that our ensemble model outperformed individual architectures, achieving an Intersection over Union (IoU) of 0.9601 and a Dice Coefficient of 0.9598 for binary segmentation, and IoU of 0.9587 and Dice Coefficient of 0.9575 for multiclass segmentation. A comparative analysis with state-of-the-art models confirmed the effectiveness of our approach. These results demonstrate the potential of transformer-based ensemble learning for oral cancer diagnosis, presenting a scalable tool for clinical applications. Future work will focus on expanding dataset diversity, optimizing computational efficiency, and integrating real-time inference for improved usability in healthcare.
Facial expression recognition (FER) has become increasingly common in research. However, region feature technologies that play an important role in this field have not been well developed. In this study, a psychology-...
详细信息
Motion sickness is a common affliction that affects nearly half of the global population and poses challenges to comfortable travel experiences, necessitating diverse intervention strategies. Pharmacological intervent...
详细信息
Internet of things (IoT)-based cameras have been proposed for surveillance and mixed reality applications in different domains. IoT cameras stream video frames produced from the scenery within their coverage area. Vid...
Internet of things (IoT)-based cameras have been proposed for surveillance and mixed reality applications in different domains. IoT cameras stream video frames produced from the scenery within their coverage area. Video frames are then processed to determine, identify, classify, and track objects of interest. Traditionally, IoT video frames are offloaded to distant cloud servers and processed by computation-intensive algorithms for video analytics. However, this approach incurs increased latency and network overhead. Recent studies proposed edge computing for resource provisioning for IoT applications. Nevertheless, edge computing presents many daunting challenges, such as the efficient management and allocation of edge server resources to IoT cameras. We propose the collaborative work of IoT cameras for video analytics. Accordingly, idle resources on an IoT camera can be used to process video frames produced by neighboring cameras. In this regard, we devised a mathematical framework for collaborative cross-camera IoT video analytics, which allows engineers and practitioners to obtain useful insides for the further design of architectures for collaborative IoT video analytics. We conduct extensive numerical evaluations and the obtained results show that the resources' utilization, offloading latency, and offloading costs are sensitive to the neighborhood resources demand.
Distributed systems and cloud computing are essential in IT (ICT). Scholars have not contemplated merging distributed systems and cloud computing to measure execution time in milliseconds and capacity in gigabytes. Di...
详细信息
DRAM vendors introduced On-Die Error Correction Codes (OD-ECC) to correct errors internally. Most OD-ECCs are based on Single Error Correction to correct individual bit errors. However, recent soft error experiments o...
详细信息
The information society requires new skills and knowledge about how to cope in a computerized world. Although it is fully assumed in the political and social discourse, it is a neglected subject in formal education. E...
详细信息
Passive RFID tag localization has been mostly focused on monostatic and/or synchronized setups. This work moves a few steps further and performs real-time localization with distributed, i.e., multistatic radios, which...
详细信息
ISBN:
(数字)9798331509057
ISBN:
(纸本)9798331509064
Passive RFID tag localization has been mostly focused on monostatic and/or synchronized setups. This work moves a few steps further and performs real-time localization with distributed, i.e., multistatic radios, which are also unsynchronized at the carrier level. It succeeds by exploiting the elliptical direction of arrival (EllDoA) algorithm with a “playback” carrier frequency offset (CFO) mitigation method, showing localization feasibility at a small error cost, even with very cheap software defined radios. The inherent carrier phase offset (CPO) of such distributed setups is addressed, and it is shown that the calibration step needs to be performed only once, and not for further reruns of the experiment; thus, the proposed method is suitable for many real-world and real-time applications, which has not been shown before, to the best of our knowledge.
暂无评论