In response to escalating road safety challenges within Algeria, marked by rising traffic volumes and urban development, the "TariqAmn Algeria" initiative emerges as a groundbreaking approach in traffic mana...
详细信息
The study aims to develop a mobile application for young children to learn Sinhala letters, shapes, colors, and storytelling incorporating machine learning models to evaluate and enhance educational activities. With t...
详细信息
The covid epidemic started in 2019 and has become the most terrifying disease that has destroyed many people's family lives, and it is frightening as an event that cannot be forgotten for the whole country to this...
详细信息
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single C...
详细信息
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and *** data need a space away fromunauthorized access,modification,or *** requirements are to be fulfilled by digital image watermarking and *** paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication *** introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver *** proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD *** addition,image encryption is implemented based on chaos and DNA *** encrypted watermarked images are then transmitted through the wireless SC-FDMA *** linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted *** subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this *** study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked *** addition,different variants of SC-FDMA bas
Indoor positioning system determine the position of objects in a closed room or story building. This system can determine not only the position but also the orientation and direction of a person's movement. This r...
详细信息
This paper describes a simulator for two types of network-on-chip designs that employs the MPLS as an essential communication tool for switching and routing at the packet level inside the chip of multiprocessing syste...
详细信息
The majority of informationtechnology organizations nowadays prefer cloud computing as their main choice due to improvements in informationtechnology. However, as a result of cloud computing's vast and open arch...
详细信息
Healthcare data contains large amounts of personal information and is privacy sensitive. The healthcare sector needs privacy protection to keep private and sensitive information safe from unauthorized access. Security...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the human cochlea in response to an external sound stimulus,as a biometric *** are robust to falsification attacks,as the uniqueness of an individual’s inner ear cannot be *** this study,we use both the raw 1D TEOAE signals,as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform(CWT).We use 1D and 2D Convolutional Neural Networks(CNN)for the former and latter,respectively,to derive the feature *** corresponding lower-dimensional feature maps are obtained using principal component analysis,which is then used as features to build classifiers using machine learning techniques for the task of person identification.T-SNE plots of these feature maps show that they discriminate well among the *** the various architectures explored,we achieve a best-performing accuracy of 98.95%and 100%using the feature maps of the 1D-CNN and 2D-CNN,respectively,with the latter performance being an improvement over all the earlier *** performance makes the TEOAE based person identification systems deployable in real-world situations,along with the added advantage of robustness to falsification attacks.
This study presents a predictive modeling approach for estimating monthly wind production in Thailand using advanced machine learning methodologies. Logistic Regression (LR), Extreme Learning Machines (ELM), and Suppo...
详细信息
暂无评论