In the era where social media significantly influences public sentiment, platforms such as Twitter have become vital in predicting stock market trends. This paper presents a cutting-edge predictive model that integrat...
详细信息
This letter evaluates the performance of the slotted Aloha protocol defined by the European Telecommunication Standard institute (ETSI) SmartBAN specification, under saturation conditions. For this purpose, we develop...
详细信息
Emotion recognition in text has become an essential research area within artificial intelligence and natural language processing due to its applications in sentiment analysis, human-computer interaction, and social me...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doc...
详细信息
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doctors to identify the exact model and manufacturer of the prosthesis when it is *** paper proposes a transfer learning-based class imbalance-aware prosthesis detection method to detect the implant’s manufacturer automatically from shoulder X-ray *** framework of the method proposes a novel training approach and a new set of batch-normalization,dropout,and fully convolutional layers in the head *** employs cyclical learning rates and weighting-based loss calculation *** modifications aid in faster convergence,avoid local-minima stagnation,and remove the training bias caused by imbalanced *** proposed method is evaluated using seven well-known pre-trained models of VGGNet,ResNet,and DenseNet *** is performed on a shoulder implant benchmark dataset consisting of 597 shoulder X-ray *** proposed method improves the classification performance of all pre-trained models by 10–12%.The DenseNet-201-based variant has achieved the highest classification accuracy of 89.5%,which is 10%higher than existing ***,to validate and generalize the proposed method,the existing baseline dataset is supplemented to six classes,including samples of two more implant *** results have shown average accuracy of 86.7%for the extended dataset and show the preeminence of the proposed method.
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl...
详细信息
The earthquake early warning (EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is...
详细信息
The earthquake early warning (EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is extracted using the primary wave earthquake precursor signal and site-specific information. In Japan's earthquake magnitude dataset, there is a chance of a high imbalance concerning the earthquakes above strong impact. This imbalance causes a high prediction error while training advanced machine learning or deep learning models. In this work, Conditional Tabular Generative Adversarial Networks (CTGAN), a deep machine learning tool, is utilized to learn the characteristics of the first arrival of earthquake P-waves and generate a synthetic dataset based on this information. The result obtained using actual and mixed (synthetic and actual) datasets will be used for training the stacked ensemble magnitude prediction model, MagPred, designed specifically for this study. There are 13295, 3989, and 1710 records designated for training, testing, and validation. The mean absolute error of the test dataset for single station magnitude detection using early three, four, and five seconds of P wave are 0.41, 0.40, and 0.38 MJMA. The study demonstrates that the Generative Adversarial Networks (GANs) can provide a good result for single-station magnitude prediction. The study can be effective where less seismic data is available. The study shows that the machine learning method yields better magnitude detection results compared with the several regression models. The multi-station magnitude prediction study has been conducted on prominent Osaka, Off Fukushima, and Kumamoto earthquakes. Furthermore, to validate the performance of the model, an inter-region study has been performed on the earthquakes of the India or Nepal region. The study demonstrates that GANs can discover effective magnitude estimation compared with non-GAN-based methods. This has a high potential
暂无评论