In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained substantial recognization. SSI offers individuals greater control over the...
详细信息
Pneumonia is an acute lung infection that has caused many fatalitiesglobally. Radiologists often employ chest X-rays to identify pneumoniasince they are presently the most effective imaging method for this ***-aided d...
详细信息
Pneumonia is an acute lung infection that has caused many fatalitiesglobally. Radiologists often employ chest X-rays to identify pneumoniasince they are presently the most effective imaging method for this ***-aided diagnosis of pneumonia using deep learning techniques iswidely used due to its effectiveness and performance. In the proposed method,the Synthetic Minority Oversampling Technique (SMOTE) approach is usedto eliminate the class imbalance in the X-ray dataset. To compensate forthe paucity of accessible data, pre-trained transfer learning is used, and anensemble Convolutional Neural Network (CNN) model is developed. Theensemble model consists of all possible combinations of the MobileNetv2,Visual Geometry Group (VGG16), and DenseNet169 models. MobileNetV2and DenseNet169 performed well in the Single classifier model, with anaccuracy of 94%, while the ensemble model (MobileNetV2+DenseNet169)achieved an accuracy of 96.9%. Using the data synchronous parallel modelin Distributed Tensorflow, the training process accelerated performance by98.6% and outperformed other conventional approaches.
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security of the *** intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system *** this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot *** this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant *** proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO *** results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness *** a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.
Human Activity Recognition(HAR)has always been a difficult task to *** is mainly used in security surveillance,human-computer interaction,and health care as an assistive or diagnostic technology in combination with ot...
详细信息
Human Activity Recognition(HAR)has always been a difficult task to *** is mainly used in security surveillance,human-computer interaction,and health care as an assistive or diagnostic technology in combination with other technologies such as the Internet of Things(IoT).Human Activity Recognition data can be recorded with the help of sensors,images,or *** daily routine-based human activities such as walking,standing,sitting,etc.,could be a difficult statistical task to classify into categories and hence 2-dimensional Convolutional Neural Network(2D CNN)MODEL,Long Short Term Memory(LSTM)Model,Bidirectional long short-term memory(Bi-LSTM)are used for the *** has been demonstrated that recognizing the daily routine-based on human activities can be extremely accurate,with almost all activities accurately getting recognized over 90%of the ***,because all the examples are generated from only 20 s of data,these actions can be recognised *** from classification,the work extended to verify and investigate the need for wearable sensing devices in individually walking patients with Cerebral Palsy(CP)for the evaluation of chosen Spatio-temporal features based on 3D foot ***-control research was conducted with 35 persons with CP ranging in weight from 25 to 65 *** Motion Capture(OMC)equipment was used as the referral method to assess the functionality and quality of the foot-worn *** average accuracy±precision for stride length,cadence,and step length was 3.5±4.3,4.1±3.8,and 0.6±2.7 cm *** cadence,stride length,swing,and step length,people with CP had considerably high inter-stride ***-worn sensing devices made it easier to examine Gait Spatio-temporal data even without a laboratory set up with high accuracy and precision about gait abnormalities in people who have CP during linear walking.
The increasing number of electronic transactions on the Internet has given rise to the design of recommendation systems. The main objective of these systems is to give recommendations to the users about the items (i.e...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has expanded the potential targets that hackers might *** adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or *** identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious *** research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)*** proposed model can identify various types of cyberattacks,including conventional and distinctive *** networks,a specific kind of feedforward neural networks,possess an intrinsic memory *** Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended *** such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual *** are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection *** model utilises Recurrent Neural Networks,specifically exploiting LSTM *** proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques.
Considering the recent developments in the digital environment,ensuring a higher level of security for networking systems is *** security approaches are being constantly developed to protect against evolving *** ensem...
详细信息
Considering the recent developments in the digital environment,ensuring a higher level of security for networking systems is *** security approaches are being constantly developed to protect against evolving *** ensemble model for the intrusion classification system yielded promising results based on the knowledge of many prior *** research work aimed to create a more diverse and effective ensemble *** this end,selected six classification models,Logistic Regression(LR),Naive Bayes(NB),K-Nearest Neighbor(KNN),Decision Tree(DT),Support Vector Machine(SVM),and Random Forest(RF)from existing study to run as independent *** the individual models were trained,a Correlation-Based Diversity Matrix(CDM)was created by determining their *** models for the ensemble were chosen by the proposed Modified Minimization Approach for Model Subset Selection(Modified-MMS)from Lower triangular-CDM(L-CDM)as *** proposed algorithm performance was assessed using the Network Security Laboratory—Knowledge Discovery in Databases(NSL-KDD)dataset,and several performance metrics,including accuracy,precision,recall,and *** selecting a diverse set of models,the proposed system enhances the performance of an ensemble by reducing overfitting and increasing prediction *** proposed work achieved an impressive accuracy of 99.26%,using only two classification models in an ensemble,which surpasses the performance of a larger ensemble that employs six classification models.
The patient health prediction system is the most critical study in medical research. Several prediction models exist to predict the patient's health condition. However, a relevant result was not attained because o...
详细信息
Maternal health during pregnancy is influenced by various factors that significantly impact pregnancy outcomes. This paper aims to highlight these critical factors, promote awareness, and advocate proactive self-care ...
详细信息
Generating novel molecules to satisfy specific properties is a challenging task in modern drug discovery,which requires the optimization of a specific objective based on satisfying chemical ***,we aim to optimize the ...
详细信息
Generating novel molecules to satisfy specific properties is a challenging task in modern drug discovery,which requires the optimization of a specific objective based on satisfying chemical ***,we aim to optimize the properties of a specific molecule to satisfy the specific properties of the generated *** Matched Molecular Pairs(MMPs),which contain the source and target molecules,are used herein,and logD and solubility are selected as the optimization *** main innovative work lies in the calculation related to a specific transformer from the perspective of a matrix *** intervals and state changes are then used to encode logD and solubility for subsequent *** the experiments,we screen the data based on the proportion of heavy atoms to all atoms in the groups and select 12365,1503,and 1570 MMPs as the training,validation,and test sets,*** models are compared with the baseline models with respect to their abilities to generate molecules with specific *** show that the transformer model can accurately optimize the source molecules to satisfy specific properties.
暂无评论