Efficient and robust data clustering remains a challenging task in the field of data analysis. Recent efforts have explored the integration of granular-ball (GB) computing with clustering algorithms to address this ch...
详细信息
The government of Bangladesh has implemented the “Stay Home” policy following the WHO recommendation to resist the community transmission of Covid-19. As a result, the routine activities of all government, semi-gove...
详细信息
To ensure both the physical and mental safety of humans during human-robot interaction (HRI), a rich body of literature has been accumulated, and the notion of socially acceptable robot behaviors has arisen. To be spe...
详细信息
Peer Instruction (PI) was introduced by Mazur [1] to help students learn physics concepts during lectures. Besides physics [2,3], PI has also been adopted in other STEM fields [4]. In this approach (Figure 1(a)), stud...
详细信息
In this paper, we investigate the synthesis problem of edit functions for opacity enforcement in systems modelled as partially-observed finite-state automata. For better plausible deniability for the edit functions, i...
详细信息
To promote a patient-centered, sustainable healthcare ecosystem, this paper explores how blockchain and Federated Learning (FL) might be integrated into the Medical Internet of Things (MIoT). A decentralized architect...
详细信息
To promote a patient-centered, sustainable healthcare ecosystem, this paper explores how blockchain and Federated Learning (FL) might be integrated into the Medical Internet of Things (MIoT). A decentralized architecture for improving data security, privacy, and interoperability between healthcare systems is proposed in this article. The article handles the drawbacks of centralized Machine Learning (ML) techniques, which frequently jeopardize the privacy of sensitive medical data, by utilizing the collaborative character of FL and the security aspects of blockchain. ML models are jointly trained while protecting patient privacy by leveraging distributed MIoT data. To effectively anticipate diseases, the study uses a variety of approaches, including FL coupled with AdaBoost, Extra Tree Classifier, Decision Tree (DT), or Linear Discriminant Analysis (LDA). Extensive testing encompassing feature selection, data splitting, cross-validation, and hyperparameter tuning guarantees the effectiveness and confidentiality of the suggested methodology. To assess the efficacy of the technique, performance measures such as Accuracy, Balanced Accuracy (BA), Fowlkes-Mallows Index (FM), Matthews Correlation Coefficient (MCC), and Bookmaker Informedness (BI) are calculated. The findings demonstrate an improved level of accuracy in contrast with conventional techniques. The research represents a novel approach to medical data analysis by choosing the best algorithm using several evaluation metrics and then incorporating it into FL.
Recent developments in computer networks and Internet of Things(IoT)have enabled easy access to *** the government and business sectors face several difficulties in resolving cybersecurity network issues,like novel at...
详细信息
Recent developments in computer networks and Internet of Things(IoT)have enabled easy access to *** the government and business sectors face several difficulties in resolving cybersecurity network issues,like novel attacks,hackers,internet criminals,and so ***,malware attacks and software piracy pose serious risks in compromising the security of *** can steal confidential data which results infinancial and reputational *** advent of machine learning(ML)and deep learning(DL)models has been employed to accomplish security in the IoT cloud *** article pre-sents an Enhanced Artificial Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection(EAGTODL-CTD)in IoT Cloud *** presented EAGTODL-CTD model encompasses the identification of the threats in the IoT cloud *** proposed EAGTODL-CTD mod-el mainly focuses on the conversion of input binaryfiles to color images,where the malware can be detected using an image classification *** EAG-TODL-CTD model pre-processes the input data to transform to a compatible *** threat detection and classification,cascaded gated recurrent unit(CGRU)model is exploited to determine class ***,EAGTO approach is employed as a hyperparameter optimizer to tune the CGRU parameters,showing the novelty of our *** performance evaluation of the EAGTODL-CTD model is assessed on a dataset comprising two class labels namely malignant and *** experimental values reported the supremacy of the EAG-TODL-CTD model with increased accuracy of 99.47%.
This paper focuses on addressing the challenge of estimating multiple-input multiple-output (MIMO) channels for wireless communication between a ground base-station and a moving vehicle. One recently recognised model ...
This paper focuses on addressing the challenge of estimating multiple-input multiple-output (MIMO) channels for wireless communication between a ground base-station and a moving vehicle. One recently recognised model for time-varying channels incorporates spatial selectivity, which is referred to as beam squint, and is particularly relevant in the millimeter-wave (mmWave) range. In such scenarios, it is essential to account for the beam squint when attempting to recover channel parameters using a training sequence. However, the use of a training sequence alone may be insufficient for this purpose. To overcome this issue, in this work, we propose a channel estimation approach that exploits information provided by the control module of the vehicle, namely its velocity. The estimation problem that is designed, regards the channel both in a parametric and a non-parametric form and the alternating direction method of multipliers is utilised to efficiently solve it. It is demonstrated via simulations that considerable gains can be achieved if information from the control unit of the vehicle can be appropriately introduced and exploited.
Diffusion-based generative models provide a powerful framework for learning to sample from a complex target distribution. The remarkable empirical success of these models applied to high-dimensional signals, including...
详细信息
暂无评论