Wearing a safety helmet at the work site of a chemical plant can effectively prevent safety accidents caused by head injuries, so it is very important to detect whether employees wear safety helmets. In order to solve...
详细信息
The increasing computational demands of deep neural networks across various applications have driven the adoption of hardware accelerators. These specialized hardware devices are tailor-made for specific computational...
详细信息
Establishing a sustainable the healthcare system necessitates the development of social, economic, and environmental norms. Although many studies concentrate on these elements separately, an integrated method of handl...
详细信息
The term Internet of Things (IoT) is used to refer as embedded devices or objects with internet access, allowing them to communicate globally, interacting with people and networks. IoT security issues are directly rel...
详细信息
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An algorithm for a 5-node mix network with XOR shuffling has been presente...
详细信息
The Disease Prediction System revolutionizes healthcare with advanced machine learning techniques for early detection of skin diseases, notably focusing on skin cancer. Through image processing and Transfer Learning, ...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
This paper presents a design method of filtering antennas with wide matching bands to realize the integration of multiple functions such as absorbing, filtering, and radiating, and protect the system as well. In our d...
详细信息
In this proposed research, an IoT -based electrical power monitoring system is developed to monitor small business stalls by adding voltage and output sensors. The system displays electrical parameters and estimated c...
详细信息
The use of deep learning enabled computer vision applications gained momentum after AlexNet convolutional neural network architecture won the ImageNet Large Scale Visual Recognition Challenge (ILSVRC) in 2012. This le...
详细信息
暂无评论