Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
Stunting is a critical child growth disorder, characterized by a height below the norm for one's age group. Despite a notable decrease in stunting prevalence in Indonesia from 37% in 2014 to 21.6% in 2022, achievi...
详细信息
The emergence of the COVID-19 pandemic resulted in an unprecedented disruption to global higher education systems. This led to a sudden shift towards online learning, which heavily relies on digital technologies. Ther...
详细信息
Intrusion detection in Internet of Things (IoT) networks is essential to identify and mitigate security breaches and unauthorized access to connected devices. As IoT devices continue to advance, securing interconnecte...
详细信息
Intrusion detection in Internet of Things (IoT) networks is essential to identify and mitigate security breaches and unauthorized access to connected devices. As IoT devices continue to advance, securing interconnected systems against malicious attacks is essential to ensure data privacy, system integrity, and user safety. However, traditional intrusion detection systems (IDSs) often struggle to adapt to novel and evolving threats. Developing a system that can autonomously learn and enhance intrusion detection capabilities to effectively identify and mitigate emerging threats is challenging. To address this issue, we propose a reinforcement learning (RL)-based approach for enhancing cybersecurity in IoT networks. First, various preprocessing techniques such as handling missing values, outliers, and min-max scaling normalization were applied. Then, domain-specific features related to network traffic patterns, including packet size distribution, packet count, and packet rate, were extracted. Statistical measures, including mean, variance, and entropy, were calculated from these features to determine temporal and spatial variations in the network data. Moreover, deep learning models, including long short-term memory networks and convolutional neural networks (CNNs), were used to automatically extract high-level features from raw data such as network logs or sensor readings. The extracted feature sets were concatenated within a feature fusion layer that enabled efficient dimensionality reduction via principal component analysis. A hybrid optimization approach was also introduced for feature selection using green anaconda optimization and the chaotic learning osprey optimization algorithm. Furthermore, an RL-based IDS (RL-IDS) that incorporates RNNs and autoencoders with a deep Q-network was proposed to enhance threat detection. Experimental outcomes emphasize the superiority of the method, obtaining 99.45% accuracy with 70% training data and 99.80% with 80%. Precision a
There has been a notable increase in research focusing on dynamic selection (DS) techniques within the field of ensemble learning. This leads to the development of various techniques for ensembling multiple classifier...
详细信息
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network *** Aerial Vehicle(UAV)communications...
详细信息
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network *** Aerial Vehicle(UAV)communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes.A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this *** the IoT system,the UAV is utilised not only to determine how the resources should be distributed but also to provide power to the wireless *** quality of service(QoS)offered by the cognitive node was interpreted as a price-based utility function,which was demonstrated in the form of a non-cooperative game theory in order to maximise customers’net utility *** energyefficient non-cooperative game theory power allocation with pricing strategy abbreviated as(EE-NGPAP)is implemented in this study with two trajectories Spiral and Sigmoidal in order to facilitate effective power management in Internet of Things(IoT)wireless *** has also been demonstrated,theoretically and by the use of simulations,that the Nash equilibrium does exist and that it is one of a *** proposed energy harvesting approach was shown,through simulations,to significantly reduce the typical amount of power thatwas *** is taken into consideration to agree with the objective of 5G *** order to converge to Nash Equilibrium(NE),the method that is advised only needs roughly 4 iterations,which makes it easier to utilise in the real world,where things aren’t always the same.
Access to healthcare is a fundamental pillar of human well-being, yet cardiovascular diseases (CVD) persist as leading contributors to global mortality. This study explores the transformative potential of Machine Lear...
详细信息
This work introduces an intrusion detection system (IDS) tailored for industrial internet of things (IIoT) environments based on an optimized convolutional neural network (CNN) model. The model is trained on a dataset...
详细信息
Histopathological analysis, particularly of nuclear morphology, is critical for identifying malignancies. Accurate nuclei segmentation plays a pivotal role in this process, as it enables detailed assessment of nuclear...
详细信息
This paper reflects on the set of tools developed in my bachelor’s thesis, titled"Continuous Automatic Development of European Parliamentary Corpora." Despite the existence of numerous corpora offering spee...
详细信息
暂无评论