Model selection is an essential step when applying machine learning to classification problems. It is typically carried out by the practitioner who strives to identify the most suitable classifier for a given problem....
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and secur...
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform *** second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s ***,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform *** audio cryptosystem discussed before in recent research is applied to answer the three previous *** simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better *** the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order *** the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.
Traffic signs secure their safety on the roads and the protection of others around them;everyone must be aware of traffic signs and other aspects of road safety. Traffic sign detection is a highly relevant computer vi...
详细信息
Question Classification plays a vital role in identifying the accurate answer to any question, and is considered as a core component of Question Answering Systems. In Nepali Natural Language Processing, the area of Qu...
详细信息
The application of synthetic Intelligence (AI) to records science has spread out a massive array of new possibilities. Via the combination of advanced evaluation strategies, effective understanding-pushed system gaini...
详细信息
Nowadays,Internet of Things(IoT)has penetrated all facets of human life while on the other hand,IoT devices are heavily prone to *** has become important to develop an accurate system that can detect malicious attacks...
详细信息
Nowadays,Internet of Things(IoT)has penetrated all facets of human life while on the other hand,IoT devices are heavily prone to *** has become important to develop an accurate system that can detect malicious attacks on IoT environments in order to mitigate security *** is one of the dreadfulmalicious entities that has affected many users for the past few *** is challenging to recognize Botnet since it has excellent carrying and hidden *** approaches have been employed to identify the source of Botnet at earlier *** Learning(ML)and Deep Learning(DL)techniques are developed based on heavy influence from Botnet detection *** spite of this,it is still a challenging task to detect Botnet at early stages due to low number of features accessible from Botnet *** current study devises IoT with Cloud Assisted Botnet Detection and Classification utilizingRat SwarmOptimizer with Deep Learning(BDC-RSODL)*** presented BDC-RSODL model includes a series of processes like pre-processing,feature subset selection,classification,and parameter ***,the network data is pre-processed to make it compatible for further ***,RSO algorithm is exploited for effective selection of subset of ***,Long Short TermMemory(LSTM)algorithm is utilized for both identification and classification of ***,Sine Cosine Algorithm(SCA)is executed for fine-tuning the hyperparameters related to LSTM *** order to validate the promising 3086 CMC,2023,vol.74,no.2 performance of BDC-RSODL system,a comprehensive comparison analysis was *** obtained results confirmed the supremacy of BDCRSODL model over recent approaches.
Reconfigurable intelligent surface (RIS) has emerged as a promising technology for next-generation wireless communications due to its ability to manipulate electromagnetic (EM) waves. This work introduces a novel RIS ...
详细信息
This paper deals with the simulation calculation of the transmission (S21) parameter in a biomaterial calculated parametrically on the basis harvest waste (residues) as a function of the density, moisture and temperat...
详细信息
Currently, Transformer-based prohibited object detection methods in X-ray images appear constantly, but there are still some shortcomings such as poor performance and high computational complexity for prohibited objec...
详细信息
Gait recognition stands out as a robust biometric tool for discerning users. Yet, adapting it to devices with limited resources, such as the STM32L4 microcontroller, demands cutting-edge strategies. This research unve...
详细信息
暂无评论