A fuzzy system for setting the priority of IT project work has been developed, in which a preliminary analysis of the metrics of readiness, permission and complexity of tasks is carried out, which makes it possible to...
详细信息
ISBN:
(数字)9798350350043
ISBN:
(纸本)9798350350050
A fuzzy system for setting the priority of IT project work has been developed, in which a preliminary analysis of the metrics of readiness, permission and complexity of tasks is carried out, which makes it possible to determine the priority of the project work. Based on this, the business analyst can effectively make decisions about the workload of the project team. The results of the work can be successfully applied to the effective management of the implementation of IT projects and the proactive management of project teams.
5G operates in the unlicensed spectrum to expand its capacity. This spectrum provides more uplink and downlink frequency bands in 5G to satisfy ultra-dense and scalability requirements. Wi-Fi is a prominent wireless t...
5G operates in the unlicensed spectrum to expand its capacity. This spectrum provides more uplink and downlink frequency bands in 5G to satisfy ultra-dense and scalability requirements. Wi-Fi is a prominent wireless technology that operates in unlicensed bands. Due to the proximity of cellular and Wi-Fi channels, utilization of both Wi-Fi and 5G New Radio (NR) can cause interference. The co-existence of 5G NR and Wi-Fi devices lacks the means of communication for negotiation and coordination among them. Listen-Before-Talk and Duty-cycling are standard Medium Access Control (MAC) mechanisms to enable co-existence. Due to a lack of coordination, network utilization becomes unfair with the existence of selfish devices. The selfish users could maximize throughput and affect other Wi-Fi and NR users. Here, we investigate the effects of selfish nodes on this Wi-Fi Co-existence with 5G. These nodes disobey exponential backoff to boost their channel acquisition. We study the effect of misbehavior through the Order Gain metric. Through standard CSMA/CA settings with overall channel occupancy of 99.75%, we demonstrate that selfish users profoundly impact fair co-existence. We study the side effects through throughput, channel sensing, and acquisition for various backoff window access patterns. Finally, we go through counteraction methods to overcome the selfish user impact.
This research relies on a feature selection method termed LasNO to analyse the progress of diabetes prediction. The ANOVA integrated with Lasso regularization identifies significant predictors like Age, BMI, DiabetesP...
详细信息
In this paper, we propose an observer-based visual pursuit control integrating three-dimensional target motion learning by Gaussian Process Regression (GPR). We consider a situation where a visual sensor equipped rigi...
详细信息
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale *** of the major issues in such...
详细信息
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale *** of the major issues in such a network is the localization of underwater *** is required for tracking objects and detecting the *** is also considered tagging of data where sensed contents are not found of any use without *** is useless for application until the position of sensed content is *** article’s major goal is to review and analyze underwater node localization to solve the localization issues in *** present paper describes various existing localization schemes and broadly categorizes these schemes as Centralized and Distributed localization schemes ***,a detailed subdivision of these localization schemes is ***,these localization schemes are compared from different *** detailed analysis of these schemes in terms of certain performance metrics has been discussed in this *** the end,the paper addresses several future directions for potential research in improving localization problems of UWSN.
The article addresses the challenges of analyzing data represented as time series, depicting the evolution of a specific process, phenomenon, or object over time. Special emphasis is placed on conducting a comparative...
详细信息
In the area of decision-making, where complexities often exceed experts' analytical capabilities, this study addresses a critical gap by introducing a novel methodology for sensitivity analysis within the Multi-Cr...
详细信息
Decentralization initiatives like Solid and *** enable data owners to control who has access to their data and to stimulate innovation by creating both application and data markets. Once data owners share their data w...
详细信息
Cricket databases contain rich and useful information to examine and forecasting patterns and *** paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning *** this a...
详细信息
Cricket databases contain rich and useful information to examine and forecasting patterns and *** paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning *** this aim,each player’s performance evolution is retrieved by using effective features that incorporate the standard performance measures of each player and their *** is performed by applying Bayesianrule,function and decision-tree-based *** evaluations are performed to validate the applicability of the proposed *** particular,the impact of the individual features on the prediction of SCs are ***,the category and model-wise feature evaluations are also conducted.A cross-validation mechanism is applied to validate the performance of our proposed approach which further confirms that the incorporated features are statistically ***,leading SCs are extracted based on their performance evolution scores and their standings are cross-checked with those provided by the International Cricket Council.
Medical data tampering has become one of the main challenges in the field of secure-aware medical data *** of normal patients’medical data to present them as COVID-19 patients is an illegitimate action that has been ...
详细信息
Medical data tampering has become one of the main challenges in the field of secure-aware medical data *** of normal patients’medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways ***,the integrity of these data can be *** detection is a method of detecting an anomaly in manipulated forged *** appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original *** neural networks(CNNs)have contributed a major breakthrough in this type of *** has been much interest from both the clinicians and the AI community in the possibility of widespread usage of artificial neural networks for quick diagnosis using medical data for early COVID-19 patient *** purpose of this paper is to detect forgery in COVID-19 medical data by using CNN in the error level analysis(ELA)by verifying the noise pattern in the *** proposed improved ELA method is evaluated using a type of data splicing forgery and sigmoid and ReLU phenomenon *** proposed method is verified by manipulating COVID-19 data using different types of forgeries and then applying the proposed CNN model to the data to detect the data *** results show that the accuracy of the proposed CNN model on the test COVID-19 data is approximately 92%.
暂无评论