Colorectal cancer is one of the most prevalent cancers in the world. It illustrates the effectiveness of early detection and treatment of precursor polyps to prevent progression to malignancy. Despite the pivotal role...
详细信息
Speech emotion recognition is a difficult task that is gaining attention in a variety of domains, including psychology, human–computer interaction, and speech processing. To recognize speech emotions, machine learnin...
详细信息
Since the current pandemic of covid 9, there have been many concerns expressed regarding public health and safety, which has led to the widespread adoption of protective measures such wearing face masks. To ensure adh...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient *** this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few ***,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each ***,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate *** when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start *** importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker ***,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
In this work, we present a novel approach for effectively reducing impulse noise from images using Conjugate Gradient Method. Our Proposed method used the iterative property of the conjugate gradient method to accurat...
详细信息
The COVID-19 coronavirus pandemic has generated a global health crisis in all Worldwide. According to the World Health Organization (WHO), protection against COVID-19 infection is an essential countermeasure. one of t...
详细信息
End-to-end systems for automatic recognition of Arabic speech have gained significant importance in the last few years. Arabic is considered as one of the low resource languages that lacks the labeled data required fo...
详细信息
Wireless Sensor Networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural atte...
详细信息
Wireless Sensor Networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural attention,routing protocols,location exploration,time exploration,*** research aims to optimize routing protocols and address the challenges arising from conflicting objectives in WSN environments,such as balancing energy consumption,ensuring routing reliability,distributing network load,and selecting the shortest *** optimization techniques have shown success in achieving one or two objectives but struggle to achieve the right balance between multiple conflicting *** address this gap,this paper proposes an innovative approach that integrates Particle Swarm Optimization(PSO)with a fuzzy multi-objective *** proposed method uses fuzzy logic to effectively control multiple competing objectives to represent its major development beyond existing methods that only deal with one or two *** search efficiency is improved by particle swarm optimization(PSO)which overcomes the large computational requirements that serve as a major drawback of existing *** PSO algorithm is adapted for WSNs to optimize routing paths based on fuzzy multi-objective *** fuzzy logic framework uses predefined membership functions and rule-based reasoning to adjust routing *** adjustments influence PSO’s velocity updates,ensuring continuous adaptation under varying network *** proposed multi-objective PSO-fuzzy model is evaluated using NS-3 *** results show that the proposed model is capable of improving the network lifetime by 15.2%–22.4%,increasing the stabilization time by 18.7%–25.5%,and increasing the residual energy by 8.9%–16.2% compared to the state-of-the-art *** proposed model also achieves a 15%–24% reduction in load variance,demonstrating balanced routing and extended net
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
This study introduces an EdgeAI-based framework for the dynamic bandwidth allocation and traffic priority prediction in 25G-Next-Generation Ethernet Passive Optical Network (NGEPON) and Beyond 5G (B5G) X-haul networks...
详细信息
暂无评论