Blockchain has shown tremendous growth in the past few years because of its decentralized and immutable architecture, which makes transactions transparent, making it a feasible choice for authentication and security p...
Blockchain has shown tremendous growth in the past few years because of its decentralized and immutable architecture, which makes transactions transparent, making it a feasible choice for authentication and security purposes. Federated learning is a collaborative model training method that can benefit from Blockchain Technology. It is vulnerable to a single point of failure while performing aggregation in a centralized server architecture. Blockchain-aided Federated Learning can be proposed for enhancing the security and privacy of user data together with removing a single aggregator. It also supports a mechanism of giving rewards to users in the form of cryptocurrency to encourage users to follow the protocol. This paper introduces a framework named Blockchain-Aided privacy preserving framework for Federated Learning (BPPF) that helps in model training on the user side with added security and privacy.
Context analysis is one of the obvious tasks in nearly all computational linguistics based works. All of these works pursue this task upto different extents using different techniques. Most of the techniques include t...
Context analysis is one of the obvious tasks in nearly all computational linguistics based works. All of these works pursue this task upto different extents using different techniques. Most of the techniques include the linguistic features, like - N-grams, content words, function words, noun phrase and verb phrase, theme extraction with relevance scoring, facets etc. There are lots of machine learning and deep learning based tools available for this task. The performances of these tools are variable according to different situations. But, the close observations cite that the performance of these systems mainly depends on the availability of the contextual words at that particular experiment. Except for a good collection of contextual words, no system can produce an effective result by using only some complex mathematical calculations. This scenario is the motivation behind this work. In this work, an attempt has been made to construct a structured set of most relevant contextual words according to the classification of text domains, mentioned in the Technology Development for Indian Languages (TDIL) corpus. As it is a group work, therefore different categories of people have been involved in this work for preparing, annotating, verifying and validating the data sets.
Predicting tomato shelf life is crucial for optimizing supply chains and reducing waste. This study utilizes IoT and machine learning to analyze postharvest characteristics of tomatoes in four ripening stages under co...
详细信息
We introduce NoxTrader, a sophisticated system designed for portfolio construction and trading execution with the primary objective of achieving profitable outcomes in the stock market, specifically aiming to generate...
详细信息
VANETs play a pivotal role in the growth/development of the intelligent transportation systems (ITS) by allowing seamless communication between vehicles and infrastructure. This paper presents a comprehensive review o...
详细信息
ISBN:
(数字)9798350378726
ISBN:
(纸本)9798350378733
VANETs play a pivotal role in the growth/development of the intelligent transportation systems (ITS) by allowing seamless communication between vehicles and infrastructure. This paper presents a comprehensive review of various routing protocols used in VANETs, focusing on topology-based, position-based, hybrid, and machine learning (ML) enhanced protocols. The analysis evaluates these protocols across key performance metrics such as scalability, latency, packet delivery ratio (PDR), overhead, and security. Hybrid and context-aware protocols provide greater adaptability but come with more complexity than standard protocols, which struggle with scalability and security in dynamic contexts. The growing combination of ML, blockchain, and federated learning into VANET routing establishes potential for enhanced performance and security. Furthermore, the paper also highlights the current limitations of an existing protocols and recognizes the directions for the research, the more emphasizing on the need for scalable, secure, and real-time adaptable solutions for next-generation VANETs.
Brain age is a critical measure that reflects the biological ageing process of the brain. The gap between brain age and chronological age, referred to as brain PAD (Predicted Age Difference), has been utilized to inve...
详细信息
Air pollution has become one of the major problems for human health across the globe. Indoor air pollution poses more risk than outdoor air pollution, since the human body is more exposed to the inside. It refers to t...
详细信息
Air pollution has become one of the major problems for human health across the globe. Indoor air pollution poses more risk than outdoor air pollution, since the human body is more exposed to the inside. It refers to the contamination of indoor air that causes harmful health problems. To purify the polluted air, the air purifier is a main necessity. In this Internet of Things (IoT) project, we have created an air purifier that purifies the indoor air by passing it through the High Efficiency Particulate Air (HEPA) filter and Ultraviolet light. The microcontroller used is the NodeMCU based on the ESP8266 WiFi enabled chip. Two MQ135 air quality sensors used to monitor the change and calculate the efficiency of the purified air. IoT customization eases the manual work of changing the purifier manually every time by providing a platform that operates on the mobile phone via Wi-Fi where the user can operate it accordingly. It provides an equivalent grade of services at a very moderate cost that is affordable even for the average person and can provide real time analytics. The proposed system is capable for providing hands-on practical operations, which enables more exciting possibilities in IoT based automation systems.
Epilepsy is a long-term neurological problem that makes it hard for people to function their daily lives normally because their seizures can happen at any time. People who have epileptic seizures often hurt their brai...
详细信息
ISBN:
(数字)9798350373783
ISBN:
(纸本)9798350373790
Epilepsy is a long-term neurological problem that makes it hard for people to function their daily lives normally because their seizures can happen at any time. People who have epileptic seizures often hurt their brains, which can lead to memory loss, mental decline, and other problems. Because of this, it is important to find epileptic seizures quickly and get medical help for them. This paper presents the optimized two-layer long short-term memory model (2L-LSTM), and it can automatically expand retrospectively and for each patient. The program automatically creates distinctive characteristics that help identify seizure patients as either epileptic or not epileptic in real time. The proposed two layer Long Short-Term Memory (2L-LSTM) classifier classifies Epileptic or non-Epileptic signals with up to $\mathbf{9 8 \%}$ accuracy. It also gives the sensitivity, specificity and F1_score of $\mathbf{9 5 \%}$, $\mathbf{9 4 \%}$ and $\mathbf{9 6 \%}$ respectively. The Simulation results shows that proposed 2L-LSTM model perform far better as compared to 1L-LSTM.
Device-to-device (D2D) communication underlay cellular network improves spectral efficiency by reusing cellular resources over short low-powered links between the devices. These D2D links can be used to fetch cached c...
Device-to-device (D2D) communication underlay cellular network improves spectral efficiency by reusing cellular resources over short low-powered links between the devices. These D2D links can be used to fetch cached contents and therefore improve the application experiences, especially for multimedia contents. In this article, we investigate the effect of caching policies on the offloading probability (also known as the hit-rate), and hence the buffering time, for video streaming applications. Designing a caching policy to maximize the hit-rate depends on several factors such as device storage capacity, instantaneous number of devices available to act as a D2D transmitter, resource allocation policy, etc. We first model the D2D links as a simple birth-death process to realize the dynamicity of the D2D links, and derive the steady-state distribution of the number of D2D links. We show that the hit-rate can be improved by increasing the caching redundancy (number of copies of a given content to be cached). Finally, through simulation we show that there exists an optimal group size and redundancy, beyond which the hit-rate do not improve.
The field of research known as 'parallel processing' examines architectural and algorithmic methods for increasing the efficiency and other desirable qualities (such as cost-effectiveness and reliability) of c...
详细信息
暂无评论