The enormous variations in food choices and lifestyle in today’s world have given rise to the demand of using recommender system as a suitable tool in making appropriate food choices. Need for choosing nutritious foo...
详细信息
This paper investigates the active reconfigurable intelligent surfaces (RIS)-assisted integrated sensing and communication (ISAC) system, in which a dual-functional base station (BS) simultaneously transmits communica...
详细信息
The internet of things technology has developed almost all the sectors including energy management. In traditional energy management system meters are used to recording the number of units and electricity used but the...
详细信息
This research concentrates to model an efficient thyroid prediction approach,which is considered a baseline for significant problems faced by the women *** major research problem is the lack of automated model to atta...
详细信息
This research concentrates to model an efficient thyroid prediction approach,which is considered a baseline for significant problems faced by the women *** major research problem is the lack of automated model to attain earlier *** existing model fails to give better prediction ***,a novel clinical decision support system is framed to make the proper decision during a time of *** stages are followed in the proposed framework,which plays a substantial role in thyroid *** steps include i)data acquisition,ii)outlier prediction,and iii)multi-stage weight-based ensemble learning process(MS-WEL).The weighted analysis of the base classifier and other classifier models helps bridge the gap encountered in one single classifier *** classifiers aremerged to handle the issues identified in others and intend to enhance the prediction *** proposed model provides superior outcomes and gives good quality prediction *** simulation is done in the MATLAB 2020a environment and establishes a better trade-off than various existing *** model gives a prediction accuracy of 97.28%accuracy compared to other models and shows a better trade than others.
In the tag recommendation task on academic platforms,existing methods disregard users’customized preferences in favor of extracting tags based just on the content of the ***,it uses co-occurrence techniques and tries...
详细信息
In the tag recommendation task on academic platforms,existing methods disregard users’customized preferences in favor of extracting tags based just on the content of the ***,it uses co-occurrence techniques and tries to combine nodes’textual content for *** still do not,however,directly simulate many interactions in network *** order to address these issues,we present a novel system that more thoroughly integrates user preferences and citation networks into article labelling ***,we first employ path similarity to quantify the degree of similarity between user labelling preferences and articles in the citation ***,the Commuting Matrix for massive node pair paths is used to improve computational ***,the two commonalities mentioned above are combined with the interaction paper labels based on the additivity of Poisson *** addition,we also consider solving the model’s parameters by applying variational *** results demonstrate that our suggested framework agrees and significantly outperforms the state-of-the-art baseline on two real datasets by efficiently merging the three relational *** on the Area Under Curve(AUC)and Mean Average Precision(MAP)analysis,the performance of the suggested task is evaluated,and it is demonstrated to have a greater solving efficiency than current techniques.
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
The agriculture industry is currently dealing with serious issues with rice plants as a result of illnesses that decrease the quantity and output of the harvest. Numerous fungi and bacteria diseases harm plants that a...
详细信息
The Indonesian republic police have provided services to the community by facilitating reporting via WhatsApp. However, messages sent through WhatsApp require manual identification to determine the type of offense rep...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
In this paper, to develop an efficient secure authentication scheme and load balancing technique in fog computing. To achieve an efficient secure authentical scheme in addition load balancing method in fog computing, ...
详细信息
暂无评论