The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device *** home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical *** paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in *** have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT *** system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing *** have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache *** feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time *** is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation ***,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber *** trial results support the proposed system and demonstrate its potential for use in everyday life.
The article discusses the importance of failure recovery in communication networks to ensure smooth and dependable service. It states that the performance of real-time applications has been negatively affected for yea...
详细信息
The integration of augmented reality (AR) into educational environments will depend on its perceived effectiveness in enhancing teaching practices and the attitudes toward the use of this technology. Therefore, the ma...
详细信息
Emerging telemedicine trends,such as the Internet of Medical Things(IoMT),facilitate regular and efficient interactions between medical devices and computing *** importance of IoMT comes from the need to continuously ...
详细信息
Emerging telemedicine trends,such as the Internet of Medical Things(IoMT),facilitate regular and efficient interactions between medical devices and computing *** importance of IoMT comes from the need to continuously monitor patients’health conditions in real-time during normal daily activities,which is realized with the help of various wearable devices and *** major health problem is workplace stress,which can lead to cardiovascular disease or psychiatric ***,real-time monitoring of employees’stress in the workplace is *** levels and the source of stress could be detected early in the fog layer so that the negative consequences can be mitigated ***,overwhelming the fog layer with extensive data will increase the load on fog nodes,leading to computational *** study aims to reduce fog computation by proposing machine learning(ML)models with two *** first phase of theMLmodel assesses the priority of the situation based on the stress *** the second phase,a classifier determines the cause of stress,which was either interruptions or time pressure while completing a *** approach reduced the computation cost for the fog node,as only high-priority records were transferred to the ***-priority records were forwarded to the *** MLapproaches were compared in terms of accuracy and prediction speed:Knearest neighbors(KNN),a support vector machine(SVM),a bagged tree(BT),and an artificial neural network(ANN).In our experiments,ANN performed best in both phases because it scored an F1 score of 99.97% and had the highest prediction speed compared with KNN,SVM,and BT.
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th...
详细信息
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is the best way to transmit data in a secure and reliable *** researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data *** algorithm has some data security *** some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original *** this paper,various data security techniques are developed,which can be used to protect the data from attackers ***,a customized American Standard Code for information Interchange(ASCII)table is *** value of each Index is defined in a customized ASCII *** an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the *** that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original *** the number of cipher values is double the original data,the attacker tries to decrypt each *** of getting the original data,the attacker gets such data that has no relation to the original *** that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain *** boundaries of each Hill text work up to that *** techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorit
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors...
详细信息
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors,as well as confirming the absence of tumors,poses a significant challenge using MRI *** approaches predominantly rely on traditional machine learning and basic deep learning methods for image *** methods often rely on manual feature extraction and basic convolutional neural networks(CNNs).The limitations include inadequate accuracy,poor generalization of new data,and limited ability to manage the high variability in MRI *** the EfficientNetB3 architecture,this study presents a groundbreaking approach in the computational engineering domain,enhancing MRI-based brain tumor *** approach highlights a major advancement in employing sophisticated machine learning techniques within computerscience and Engineering,showcasing a highly accurate framework with significant potential for healthcare *** model achieves an outstanding 99%accuracy,exhibiting balanced precision,recall,and F1-scores across all tumor types,as detailed in the classification *** successful implementation demonstrates the model’s potential as an essential tool for diagnosing and classifying brain tumors,marking a notable improvement over current *** integration of such advanced computational techniques in medical diagnostics can significantly enhance accuracy and efficiency,paving the way for wider *** research highlights the revolutionary impact of deep learning technologies in improving diagnostic processes and patient outcomes in neuro-oncology.
Channel assignment has emerged as an essential study subject in Cognitive Radio-basedWireless Mesh Networks(CR-WMN).In an era of alarming increase in Multi-Radio Multi-Channel(MRMC)network expansion interference is de...
详细信息
Channel assignment has emerged as an essential study subject in Cognitive Radio-basedWireless Mesh Networks(CR-WMN).In an era of alarming increase in Multi-Radio Multi-Channel(MRMC)network expansion interference is decreased and network throughput is significantly increased when non-overlapping or partially overlapping channels are correctly *** of its ad hoc behavior,dynamic channel assignment outperforms static channel *** reduces network throughput in the *** a result,there is an extensive research gap for an algorithm that dynamically distributes channels while accounting for all types of *** work presents a method for dynamic channel allocations using unsupervisedMachine Learning(ML)that considers both coordinated and uncoordinated *** machine learning uses coordinated and non-coordinated interference for dynamic channel *** determine the applicability of the proposed strategy in reducing channel interference while increasingWMNthroughput,a comparison analysis was *** the simulation results of our proposed algorithm are compared to those of the Routing Channel Assignment(RCA)algorithm,the throughput of our proposed algorithm has increased by 34%compared to both coordinated and non-coordinated interferences.
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images r...
详细信息
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images reflecting a highly challenging and unconstraint *** methodology for building the dataset consists of four core phases;that include acquisition of videos,extraction of frames,localization of face regions,and cropping and resizing of detected face *** raw images in the dataset consist of a total of 4613 frames obtained fromvideo *** processed images in the dataset consist of the face regions of 250 persons extracted from raw data images to ensure the authenticity of the presented *** dataset further consists of 8 images corresponding to each of the 250 subjects(persons)for a total of 2000 *** portrays a highly unconstrained and challenging environment with human faces of varying sizes and pixel quality(resolution).Since the face regions in video sequences are severely degraded due to various unavoidable factors,it can be used as a benchmark to test and evaluate face detection and recognition algorithms for research *** have also gathered and displayed records of the presence of subjects who appear in presented frames;in a temporal *** can also be used as a temporal benchmark for tracking,finding persons,activity monitoring,and crowd counting in large crowd scenarios.
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider sp...
详细信息
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider spread and geographically distributed nodes to support mobility,real-time interaction,and location-based *** provide optimum quality of user life in moderm buildings,we rely on a holistic Framework,designed in a way that decreases latency and improves energy saving and services efficiency with different *** EVent system Specification(DEVS)is a formalism used to describe simulation models in a modular *** this work,the sub-models of connected objects in the building are accurately and independently designed,and after installing them together,we easily get an integrated model which is subject to the fog computing *** results show that this new approach significantly,improves energy efficiency of buildings and reduces ***,with DEVS,we can easily add or remove sub-models to or from the overall model,allowing us to continually improve our designs.
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi...
详细信息
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and *** of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’*** goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO *** projects belong to OSMO vendors,having offices in developing countries while providing services to developed *** the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed *** proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden *** results express that the suggested model has gained a notable recognition rate in comparison to any previous *** current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment.
暂无评论