As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem...
详细信息
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive ***,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied *** addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.
Research in the area of knowledge management for improving academic performance has been on the rise in recent years. The effectiveness of knowledge management in improving the quality of decision-making in higher edu...
详细信息
This paper presents a survey of energy-aware task scheduling in Cyber-Physical systems (CPSs) using Machine Learning approaches. It discusses the challenges of energy-aware scheduling in CPSs, outlining the important ...
详细信息
A collaborative filtering-based recommendation system has been an integral part of e-commerce and *** keep the recommendation systems reliable,authentic,and superior,the security of these systems is very *** the exist...
详细信息
A collaborative filtering-based recommendation system has been an integral part of e-commerce and *** keep the recommendation systems reliable,authentic,and superior,the security of these systems is very *** the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks,in this paper,we prove that they fail to detect a new or unknown *** develop a new attack model,named Obscure attack,with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as *** Obscure attack is able to push target items to the top-N list as well as remove the actual rated items from the *** proposed attack is more effective at a smaller number of k in top-k similar user as compared to other existing *** effectivity of the proposed attack model is tested on the MovieLens dataset,where various classifiers like SVM,J48,random forest,and naïve Bayes are utilized.
Falls are the contributing factor to both fatal and nonfatal injuries in the ***,pre-impact fall detection,which identifies a fall before the body collides with the floor,would be ***,researchers have turned their att...
详细信息
Falls are the contributing factor to both fatal and nonfatal injuries in the ***,pre-impact fall detection,which identifies a fall before the body collides with the floor,would be ***,researchers have turned their attention from post-impact fall detection to pre-impact fall ***-impact fall detection solutions typically use either a threshold-based or machine learning-based approach,although the threshold value would be difficult to accu-rately determine in threshold-based ***,while additional features could sometimes assist in categorizing falls and non-falls more precisely,the esti-mated determination of the significant features would be too time-intensive,thus using a significant portion of the algorithm’s operating *** this work,we developed a deep residual network with aggregation transformation called FDSNeXt for a pre-impact fall detection approach employing wearable inertial *** proposed network was introduced to address the limitations of fea-ture extraction,threshold definition,and algorithm *** training on a large-scale motion dataset,the KFall dataset,and straightforward evaluation with standard metrics,the proposed approach identified pre-impact and impact falls with high accuracy of 91.87 and 92.52%,*** addition,we have inves-tigated fall detection’s performances of three state-of-the-art deep learning models such as a convolutional neural network(CNN),a long short-term memory neural network(LSTM),and a hybrid model(CNN-LSTM).The experimental results showed that the proposed FDSNeXt model outperformed these deep learning models(CNN,LSTM,and CNN-LSTM)with significant improvements.
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
Eczema disease diagnosis and treatment are frequently challenging procedures. Recent development in artificial intelligence (AI) or digital healthcare technology have improved the self-management of severe chronic dis...
详细信息
Women from middle age to old age are mostly screened positive for Breast cancer which leads to *** over the past decades,the overall sur-vival rate in breast cancer has improved due to advancements in early-stage diag...
详细信息
Women from middle age to old age are mostly screened positive for Breast cancer which leads to *** over the past decades,the overall sur-vival rate in breast cancer has improved due to advancements in early-stage diag-nosis and tailored *** all hospital brings high awareness and early detection technologies for breast *** increases the survival rate of *** traditional breast cancer treatment takes so long,early cancer techniques require an automation *** research provides a new methodol-ogy for classifying breast cancer using ultrasound pictures that use deep learning and the combination of the best ***,after successful learning of Convolutional Neural Network(CNN)algorithms,data augmentation is used to enhance the representation of the feature *** it uses BreastNet18 withfine-tuned VGG-16 model for pre-training the augmented *** feature classification,Entropy controlled Whale Optimization Algorithm(EWOA)is *** features that have been optimized using the EWOA were utilized to fuse and optimize the *** identify the breast cancer pictures,training classifiers are *** using the novel probability-based serial technique,the best-chosen characteristics are fused and categorized by machine learning *** main objective behind the research is to increase tumor prediction accuracy for saving human *** testing was performed using a dataset of enhanced Breast Ultrasound Images(BUSI).The proposed method improves the accuracy com-pared with the existing methods.
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a cl...
详细信息
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a class of challenging optimization problems called high-dimensional expensive problems(HEPs).The evaluation of their objective fitness requires expensive resource due to their use of time-consuming physical experiments or computer ***,it is hard to traverse the huge search space within reasonable resource as problem dimension *** evolutionary algorithms(EAs)tend to fail to solve HEPs competently because they need to conduct many such expensive evaluations before achieving satisfactory *** reduce such evaluations,many novel surrogate-assisted algorithms emerge to cope with HEPs in recent *** there lacks a thorough review of the state of the art in this specific and important *** paper provides a comprehensive survey of these evolutionary algorithms for *** start with a brief introduction to the research status and the basic concepts of ***,we present surrogate-assisted evolutionary algorithms for HEPs from four main *** also give comparative results of some representative algorithms and application ***,we indicate open challenges and several promising directions to advance the progress in evolutionary optimization algorithms for HEPs.
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating *** connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergen...
详细信息
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating *** connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented *** ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and *** these approaches,Intrusion Detection systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of *** study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification *** combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of *** analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT *** results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack *** the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of *** work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.
暂无评论