Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni...
详细信息
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat...
详细信息
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet...
详细信息
In the present research, we developed an application that measures acceleration by a smartphone located at the waist, along with a deep learning system that automatically detects six behavioral activities (walking, ru...
详细信息
EEG signals for real-time emotion identification are crucial for affective computing and human-computer interaction. The current emotion recognition models, which rely on a small number of emotion classes and stimuli ...
详细信息
EEG signals for real-time emotion identification are crucial for affective computing and human-computer interaction. The current emotion recognition models, which rely on a small number of emotion classes and stimuli like music and images in controlled lab conditions, have poor ecological validity. Furthermore, identifying relevant EEG signal features is crucial for efficient emotion identification. According to the complexity, non-stationarity, and variation nature of EEG signals, which make it challenging to identify relevant features to categorize and identify emotions, a novel approach for feature extraction and classification concerning EEG signals is suggested based on invariant wavelet scattering transform (WST) and support vector machine algorithm (SVM). The WST is a new time-frequency domain equivalent to a deep convolutional network. It produces scattering feature matrix representations that are stable against time-warping deformations, noise-resistant, and time-shift invariant existing in EEG signals. So, small, difficult-to-measure variations in the amplitude and duration of EEG signals can be captured. As a result, it addresses the limitations of the previous feature extraction approaches, which are unstable and sensitive to time-shift variations. In this paper, the zero, first, and second order features from DEAP datasets are obtained by performing the WST with two deep layers. Then, the PCA method is used for dimensionality reduction. Finally, the extracted features are fed as inputs for different classifiers. In the classification step, the SVM classifier is utilized with different classification algorithms such as k-nearest neighbours (KNN), random forest (RF), and AdaBoost classifier. This research employs a principal component analysis (PCA) approach to reduce the high dimensionality of scattering characteristics and increase the computational efficiency of our classifiers. The proposed method is performed across four different emotional classific
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
This study deals with structural coloration caused the optical properties having multiple reflection peaks. Getting the dominant wavelengths and the color coordinates in sRGB color space from the reflection by thin la...
详细信息
Chatbot technology is considered one of the latest artificial intelligence tools used to achieve interaction between the organization and the customer. It relies on natural language processing, as it helps the organiz...
详细信息
This study deals with the coordination of surge protection devices (SPD) in photovoltaic systems (PV). A PV farm model was developed in MATLAB Simulink with all the main components, solar panels, converter, grounding ...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard ***,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been *** using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to *** of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization *** the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed *** to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance *** other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and *** results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection.
暂无评论