Traffic flow prediction in urban areas is essential in the IntelligentTransportation System (ITS). Short Term Traffic Flow (STTF) predictionimpacts traffic flow series, where an estimation of the number of vehicleswil...
详细信息
Traffic flow prediction in urban areas is essential in the IntelligentTransportation System (ITS). Short Term Traffic Flow (STTF) predictionimpacts traffic flow series, where an estimation of the number of vehicleswill appear during the next instance of time per hour. Precise STTF iscritical in Intelligent Transportation System. Various extinct systems aim forshort-term traffic forecasts, ensuring a good precision outcome which was asignificant task over the past few years. The main objective of this paper is topropose a new model to predict STTF for every hour of a day. In this paper,we have proposed a novel hybrid algorithm utilizing Principal ComponentAnalysis (PCA), Stacked Auto-Encoder (SAE), Long Short Term Memory(LSTM), and K-Nearest Neighbors (KNN) named PALKNN. Firstly, PCAremoves unwanted information from the dataset and selects essential ***, SAE is used to reduce the dimension of input data using onehotencoding so the model can be trained with better speed. Thirdly, LSTMtakes the input from SAE, where the data is sorted in ascending orderbased on the important features and generates the derived value. Finally,KNN Regressor takes information from LSTM to predict traffic flow. Theforecasting performance of the PALKNN model is investigated with OpenRoad Traffic Statistics dataset, Great Britain, UK. This paper enhanced thetraffic flow prediction for every hour of a day with a minimal error *** extensive experimental analysis was performed on the benchmark *** evaluated results indicate the significant improvement of the proposedPALKNN model over the recent approaches such as KNN, SARIMA, LogisticRegression, RNN, and LSTM in terms of root mean square error (RMSE)of 2.07%, mean square error (MSE) of 4.1%, and mean absolute error (MAE)of 2.04%.
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across various *** increasing number of users are participating in application systems that use blockchain as their underlying *** the number of transactions and the capital involved in blockchain grow,ensuring information security becomes *** the verification of transactional information security and privacy has emerged as a critical ***-based verification methods can effectively eliminate the need for centralized third-party ***,the efficiency of nodes in storing and verifying blockchain data faces unprecedented *** address this issue,this paper introduces an efficient verification scheme for transaction ***,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all ***,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous *** analyses and simulation experiments conclusively demonstrate the superior performance of this *** verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional *** findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of *** scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
The management of computing resources through the computing power network (CPN) has gradually become a focal point of research. With the development of the 6th generation (6G) mobile networks, some promising technolog...
详细信息
Sadri is the most widely used language of the Chotanagpur Plateau region of India. This is primarily a spoken language and developing an automatic speech recognition (ASR) system in Sadri is extremely important. When ...
详细信息
Every day,websites and personal archives create more and more *** size of these archives is *** comfort of use of these huge digital image gatherings donates to their ***,not all of these folders deliver relevant inde...
详细信息
Every day,websites and personal archives create more and more *** size of these archives is *** comfort of use of these huge digital image gatherings donates to their ***,not all of these folders deliver relevant indexing *** the outcomes,it is dif-ficult to discover data that the user can be absorbed ***,in order to determine the significance of the data,it is important to identify the contents in an informative *** annotation can be one of the greatest problematic domains in multimedia research and computer ***,in this paper,Adap-tive Convolutional Deep Learning Model(ACDLM)is developed for automatic image ***,the databases are collected from the open-source system which consists of some labelled images(for training phase)and some unlabeled images{Corel 5 K,MSRC v2}.After that,the images are sent to the pre-processing step such as colour space quantization and texture color class *** pre-processed images are sent to the segmentation approach for efficient labelling technique using J-image segmentation(JSEG).Thefinal step is an auto-matic annotation using ACDLM which is a combination of Convolutional Neural Network(CNN)and Honey Badger Algorithm(HBA).Based on the proposed classifier,the unlabeled images are *** proposed methodology is imple-mented in MATLAB and performance is evaluated by performance metrics such as accuracy,precision,recall and F1_*** the assistance of the pro-posed methodology,the unlabeled images are labelled.
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs...
详细信息
Hyperparameter optimization (HPO) has been well-developed and evolved into a well-established research topic over the decades. With the success and wide application of deep learning, HPO has garnered increased attenti...
详细信息
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b...
详细信息
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced by the existing system. This research concentrates on adopting a graphbasedfeature learning process to reduce feature dimensionality. The incoming samples arecorrectly classified and optimised using an Adaboost classifier with an improved grey wolfoptimiser (g-AGWO). The proposed IGWO optimisation approach is adopted to fulfil the multiconstraintissues related to bot detection and provide better local and global solutions (to satisfyexploration and exploitation). The extensive results show that the proposed g-AGWO model outperformsexisting approaches to reduce feature dimensionality, under-fitting/over-fitting andexecution time. The error rate prediction shows the feasibility of the given model to work over thechallenging environment. This model also works efficiently towards the unseen data to achievebetter generalization.
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
As an important computer vision task that can be used in many areas, facial expression recognition (FER) has been widely studied which much progress has been obtained especially when deep learning (DL) approaches have...
详细信息
暂无评论