Many companies still rely on manual data entry methods for managing their invoices. Some of these companies deal with a high volume of invoices in various formats daily, resulting in time-consuming processes and resou...
详细信息
The rapid expansion of loT-based sensor networks has necessitated the development of efficient edge analytics frameworks to process vast amounts of data in real time while minimizing computational overhead. Deep learn...
详细信息
The evolution of technologies in the last decades has transformed the whole human interaction experience with the digital world. Integrated into users' home voice assistant devices has rationalized personal intera...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
COVID-19 remains to proliferate precipitously in the *** has significantly influenced public health,the world economy,and the persons’***,there is a need to speed up the diagnosis and precautions to deal with COVID-1...
详细信息
COVID-19 remains to proliferate precipitously in the *** has significantly influenced public health,the world economy,and the persons’***,there is a need to speed up the diagnosis and precautions to deal with COVID-19 *** this explosion of this pandemic,there is a need for automated diagnosis tools to help specialists based onmedical *** paper presents a hybrid Convolutional Neural Network(CNN)-based classification and segmentation approach for COVID-19 detection from Computed Tomography(CT)*** proposed approach is employed to classify and segment the COVID-19,pneumonia,and normal CT *** classification stage is firstly applied to detect and classify the input medical CT ***,the segmentation stage is performed to distinguish between pneumonia and COVID-19 CT *** classification stage is implemented based on a simple and efficient CNN deep learning *** model comprises four Rectified Linear Units(ReLUs),four batch normalization layers,and four convolutional(Conv)*** layer depends on filters with sizes of 64,32,16,and 8.A2×2windowand a stride of 2 are employed in the utilized four max-pooling layers.A soft-max activation function and a Fully-Connected(FC)layer are utilized in the classification stage to perform the detection *** the segmentation process,the Simplified Pulse Coupled Neural Network(SPCNN)is utilized in the proposed hybrid *** proposed segmentation approach is based on salient object detection to localize the COVID-19 or pneumonia region,*** summarize the contributions of the paper,we can say that the classification process with a CNN model can be the first stage a highly-effective automated diagnosis *** the images are accepted by the system,it is possible to perform further processing through a segmentation process to isolate the regions of interest in the *** region of interest can be assesses both automatically and through ***
This paper summarizes the technical activities of a three-year-long IEEE Task Force (TF) on State Estimation (SE) for Integrated Energy Systems (IES). It presents the formal definition and characteristics of IES, alon...
详细信息
Distributed Denial-of-Service (DDoS) attacks disrupt networks by flooding systems with traffic from multiple sources, making real-time detection essential. Integrating Machine Learning (ML) with Software-Defined Netwo...
详细信息
In this work, an attempt is made for the first time to use the measurement pattern generated by morphological transformation quantified by Hausdorff fractal dimension (HFD) and classified with ensemble learning based ...
详细信息
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero...
详细信息
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed *** researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English ***,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any *** has been implemented using PHP with VS code *** robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and *** SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
Mobile robots are now widely used in numerous real-world applications that have complex navigation requirements, especially in environments used by humans. This requires highly accurate navigation that can be performe...
详细信息
ISBN:
(数字)9798331509231
ISBN:
(纸本)9798331509248
Mobile robots are now widely used in numerous real-world applications that have complex navigation requirements, especially in environments used by humans. This requires highly accurate navigation that can be performed in realtime. In this paper, a method for generating a smooth motion of nonholonomic mobile robots is proposed. It enables robots to move optimally toward the desired goal and allows fast path replanning when encountering unknown or dynamic obstacles. The method generates smooth, collision-free trajectories based on clothoids, ensuring high computational efficiency and suitability for realtime path planning. By applying a smoothing algorithm, the proposed method improves the robot's efficiency in terms of travel time and trajectory length from start to goal, as demonstrated by a comparison with model predictive control.
暂无评论