Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Methods: However, access to a user's access legitimacy and impr...
详细信息
Multiclass Classification can be implemented by using consequent approaches to translate the multiclass problem into binary class classification problems and fuzzy classification methods. This work proposes a predicti...
详细信息
With the rapid increase in cloud services and the increasing shift toward them, balancing the cloud load has become a critical research issue. The increasing demand from customers for technology services worldwide is ...
详细信息
作者:
Satone, Aditya P.Daronde, Subodh
Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Biomedical Engineering Maharashtra Wardha442001 India
Due to the wealth of information accessible on many insurance issues, including travel and auto insurance, individuals are becoming more and more impacted by these kinds of insurance in today's society. But this t...
详细信息
Air pollution is one of the innumerable menaces an individual comes across every moment. Countless means to make urban lives smoother are indebted to witnessing air pollution and other types of pollution. It is contri...
详细信息
This paper presents a novel approach aimed at developing a secure secret key-sharing system optimized for resource-constrained Internet of Things (IoT) devices. Focusing on the MQTT protocol, the research endeavors to...
详细信息
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com...
详细信息
Hyperspectral image (HSI) classification is crucial for applications in climate action, land use analysis, disaster risk reduction, and informed decision-making, given the complex spatial and spectral variations inher...
详细信息
Developing cognitive capabilities in autonomous agents stands as a challenging yet pivotal task. In order to construct cohesive representations and extract meaningful insights from the environment, the brain utilizes ...
详细信息
Developing cognitive capabilities in autonomous agents stands as a challenging yet pivotal task. In order to construct cohesive representations and extract meaningful insights from the environment, the brain utilizes patterns from a variety of sensory inputs, including vision and sound. Furthermore, related sensory inputs can activate each other’s representations, highlighting the brain’s ability to associate and integrate information across different sensory channels – key to cognitive development and adaptive learning. Current learning methods often mirror the developmental process of infants, who enhance their cognition through guidance and exploration. These methods often struggle with issues such as catastrophic forgetting and stability-plasticity trade-offs. This study presents a novel brain-inspired hierarchical autonomous framework, Cognitive Deep Self-Organizing Neural Network (CDSN), designed to enable autonomous agents to acquire object concepts dynamically. The architecture includes dual parallel audio-visual information pathways, incorporating three layers based on a Topological Kernel CIM-based Adaptive Resonance Neural Network (TC-ART). The first layer, referred to as the receptive layer, learns and organizes visual attributes and object names autonomously in an unsupervised manner. Subsequently, the second layer, the concept layer, distills clustered results from the corresponding receptive layer to create succinct symbol representation. In a synchronized manner, visual and auditory concepts are combined concurrently in the third layer, the associative layer, to establish real-time associative connections between the modalities. Furthermore, this layer introduces a top-down response approach, allowing agents to independently retrieve associated modalities and adapt acquired knowledge in a hierarchical manner. Experimental evaluations conducted on object datasets demonstrate the proposed architecture’s efficacy in online learning and the association o
By 2025, the expected 50 billion connected devices worldwide will heighten risks of physical and direct attacks on critical systems. The Internet of Battlefield Things (IoBT) and embedded devices in industrial control...
详细信息
暂无评论