Multi-view depth estimation plays a critical role in reconstructing and understanding the 3D world. Recent learning-based methods have made significant progress in it. However, multi-view depth estimation is fundament...
详细信息
Fuzzy data processing enables data enrichment and increases data interpretation in industrial environments. In the cloud-based IoT data ingestion pipelines, fuzzy data processing can be implemented in several location...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Fuzzy data processing enables data enrichment and increases data interpretation in industrial environments. In the cloud-based IoT data ingestion pipelines, fuzzy data processing can be implemented in several locations, closer to the IoT events gateways, stream processors, or the persistence layer before the data is visualized. Since Automated Guided Vehicles (AGV)-enabled manufacturing can produce vast amounts of data, the decision on the placement of the fuzzy data processing can be important for secondary processes performed on the enriched data, like the predictive maintenance inferencing. In this paper, we analyze two locations of fuzzy data processing in the cloud-based environment built for monitoring AGVs in smart factories - by formulating fuzzy queries against data streams on stream processing units and data at rest in a database. The querying scenarios cover fuzzy filtering with simple and complex criteria, fuzzy filtering through assignment to a linguistic variable, and joining data streams by representing joining attributes as fuzzy numbers. The experimental results show that querying the data stream can be more efficient and profitable in the scalable environment of many AGVs. However, the enrichment provided for the data at rest is also beneficial when gathering data for building future predictive maintenance models.
Acute Lymphocytic Leukaemia (ALL) is a dangerous malignancy that not only attacks adults but also contributes to roughly 25% of children. A precise and on-time diagnosis of cancer is a critical prerequisite for effect...
Acute Lymphocytic Leukaemia (ALL) is a dangerous malignancy that not only attacks adults but also contributes to roughly 25% of children. A precise and on-time diagnosis of cancer is a critical prerequisite for effective therapy to enhance survival rates. It is challenging to identify cancer cells from normal cells because leukemic cells seem extremely identical to normal cells beneath the microscope. Normally, morphological analysis for the detection of ALL is conducted physically on blood cells by qualified medical individuals, which has various drawbacks, like a lack of medical experts, slow analysis, and prognosis which depends on the knowledge of medical professionals. For this reason, we provide a robust method for improving the reliability of ALL identification using feature extraction and a Machine Learning (ML) model to discriminate between cancerous and healthy cells in images. To extract texture features for analysis, we employ the First Order Histogram (FOH) and the Gray-Level Co-occurrence Matrix (GLCM) in our technique. Logistic Regression (LR), Naive Bayes (NB), and Artificial Neural Network (ANN) are used in the categorizing method. The simulation results demonstrate that combining GLCM feature extraction with the ANN model yields the highest accuracy, correctly predicting 595 out of 600 data samples. The accuracy was 99.17%, which is quite remarkable.
PD, or Parkinson's Disease, is a neurodegenerative disorder that commonly disorients movement abilities. Hence, correctly identifying this disease at its early stages is essential for appropriate treatment. The co...
详细信息
ISBN:
(数字)9798350379945
ISBN:
(纸本)9798350379952
PD, or Parkinson's Disease, is a neurodegenerative disorder that commonly disorients movement abilities. Hence, correctly identifying this disease at its early stages is essential for appropriate treatment. The conventional diagnostic methods are usually not able to accurately identify the early signs of Parkinson's disease (PD) as they depend on the visible symptoms and the patient's self-reports. The study suggests deploying a deep belief network (DBN) method, considered a highly advanced machine learning algorithm, which is more of a memory structure capable of learning deeply and hierarchically. Their study implied the use of a DBM model for a diverse data set of 500 PD subjects suspected to have disease in its early stage. The dataset contains medical records, speaking analysis, audio recordings of subjects, and biometric monitoring. The model was trained using a two-phase training approach. The first phase is an unsupervised pre-training process to learn general characteristics. The results were very encouraging: the DBN model achieved an accuracy of 93%, yielded a sensitivity of 90%, specificity of 93% and AVC of 0. 7. 97. The performance of these measures was better than that of the ordinary diagnostic methods, which had an accuracy of 85%, a sensitivity of 80%, a specificity of 85% and an AVC of 0.85.
Networking technology is expanded along with cyber threats. Cyber threats are the instances which adversely influences the functional operations of the system or network. It results in various issues such as illegal a...
Networking technology is expanded along with cyber threats. Cyber threats are the instances which adversely influences the functional operations of the system or network. It results in various issues such as illegal access, data leakage, data stolen, DDoS attacks, etc. To overcome such issues, several intrusion detection systems are implemented over the past years. Though, these intrusion detection systems exhibit several limitations while trying to achieve excellent efficiency in attack detection. In this survey, totally 50 cyber-attack detection based research works are analysed under several perspectives. The analysis is done on several IDS techniques implemented in existing works. The reviewed learning-based approaches are explained in two major categories as ML and DL approaches. Here, the ML algorithms are further classified into three types: supervised, unsupervised and reinforcement learning approaches. Moreover, the existing works are also analysed in accordance with optimization algorithms and it is classified as metaheuristic and stochastic algorithms. In which, population-based algorithms and swarm-based algorithms are the categories classified under metaheuristic algorithms. In addition, the analyses are also performed on datasets usage and cyber-attack mitigation models. Furthermore, the analysis on existing works is done on performance analysis. And it is analysed under performance of cyber-attack detection models with specific description about maximum and minimum performance attained by recent works on cyber-attack detection models. Finally, the chronological review and challenges involved in existing cyber-attack detection models are discussed.
As the pandemic COVID-19 has severely affected the entire world, it became the utmost necessity of careful prioritization and utilization of limited medical resources, especially for the resource-constraint societies....
详细信息
In the realm of fake logo detection, the continuous surge in digital content manipulation necessitates advanced and efficient methodologies for safeguarding brand integrity. This study explores the application of dive...
In the realm of fake logo detection, the continuous surge in digital content manipulation necessitates advanced and efficient methodologies for safeguarding brand integrity. This study explores the application of diverse machine learning models, ranging from traditional algorithms like K-Nearest Neighbors (KNN) and Support Vector Machines (SVM) to sophisticated deep learning (DL) architectures such as VGG19, Inception, and Convolutional Neural Networks (CNN). The proposed methodology combines feature extraction using VGG19 with classification using an Inception model, presenting a novel approach to enhance detection accuracy. Evaluation metrics, including accuracy, precision, specificity, and sensitivity, which enhance the performance of each model. Computational efficiency is also analyzed, providing a comprehensive understanding of the trade-offs between accuracy and processing speed. The proposed methodology emerges as a promising solution, achieving a remarkable accuracy of 97% while maintaining efficiency. This study contributes to the evolving landscape of fake logo detection, offering valuable insights for practical implementation in scenarios demanding precision, speed, and reliability.
Research into somatic mutations in cancer cell DNA and their role in tumour growth and progression between successive stages is crucial for improving our understanding of cancer evolution. Mathematical and computer mo...
详细信息
Herein,a two-node beam element enriched based on the Lagrange and Hermite interpolation function is proposed to solve the governing equation of a functionally graded porous(FGP)curved nanobeam on an elastic foundation...
详细信息
Herein,a two-node beam element enriched based on the Lagrange and Hermite interpolation function is proposed to solve the governing equation of a functionally graded porous(FGP)curved nanobeam on an elastic foundation in a hygro–thermo–magnetic *** material properties of curved nanobeams change continuously along the thickness via a power-law distribution,and the porosity distributions are described by an uneven porosity *** effects of magnetic fields,temperature,and moisture on the curved nanobeam are assumed to result in axial loads and not affect the mechanical properties of the *** equilibrium equations of the curved nanobeam are derived using Hamilton’s principle based on various beam theories,including the classical theory,first-order shear deformation theory,and higher-order shear deformation theory,and the nonlocal elasticity *** accuracy of the proposed method is verified by comparing the results obtained with those of previous reliable ***,the effects of different parameters on the free vibration behavior of the FGP curved nanobeams are investigated comprehensively.
作者:
A KannagiPavan ChaudharyMuthupandi GAssociate Professor
Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India Assistant Professor
Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Associate Professor
Department of Electronics and Communication Engineering Presidency University Bangalore Karnataka India
This paper introduces a novel methodological approach to evaluating security measures within simulated real-world contexts. By leveraging three distinct algorithms Vulnerability Scoring Algorithm (VSA), the Attack Sim...
This paper introduces a novel methodological approach to evaluating security measures within simulated real-world contexts. By leveraging three distinct algorithms Vulnerability Scoring Algorithm (VSA), the Attack Simulation Algorithm (ASA), and the Impact Assessment Algorithm (IAA) this provides an exhaustive analysis of potential vulnerabilities, simulate cyberattacks based on these vulnerabilities, and gauge the consequences of successful breaches. The Proposed method's foundational algorithm, VSA, quantifies vulnerabilities' severity, whereas ASA simulates realistic attacks and calculates the likelihood of their success. Lastly, the IAA assesses the potential impact of successful attacks. Collectively, these algorithms offer a rigorous and holistic evaluation of security measures. The findings visualized and underscored the superior performance of our proposed method compared to traditional approaches. This research contributes a valuable tool set for organizations seeking to fortify their security posture in an ever-evolving threat landscape.
暂无评论