Outlier is a value that lies outside most of the other values in a dataset. Outlier exploration has a huge importance in almost all the industry applications like medical diagnosis, credit card fraudulence and intrusi...
详细信息
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communi...
详细信息
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communicating with *** tracking(ET)has become a useful method to detect *** vital aspect of moral erudition is the aptitude to have common visual *** eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early ***-tracking data can offer insightful information about the behavior and thought processes of people with ASD,but it is important to be aware of its limitations and to combine it with other types of data and assessment techniques to increase the precision of ASD *** operates by scanning the paths of eyes for extracting a series of eye projection points on images for examining the behavior of children with *** purpose of this research is to use deep learning to identify autistic disorders based on eye *** Chaotic Butterfly Optimization technique is used to identify this specific ***,this study develops an ET-based Autism Spectrum Disorder Diagnosis using Chaotic Butterfly Optimization with Deep Learning(ETASD-CBODL)*** presented ETASDCBODL technique mainly focuses on the recognition of ASD via the ET and DL *** accomplish this,the ETASD-CBODL technique exploits the U-Net segmentation technique to recognize interested *** addition,the ETASD-CBODL technique employs Inception v3 feature extraction with CBO algorithm-based hyperparameter ***,the long-shorttermmemory(LSTM)model is exploited for the recognition and classification of *** assess the performance of the ETASD-CBODL technique,a series of simulations were performed on datasets from the figure-shared data *** experimental values of accuracy(99.29%),precision(98.78%),sensitivity(99.29%)and specificity(99.29%)showed a better perfo
With the swift advancement of automotive technology, the need for efficient allocation of resources in V2V (vehicle-to-vehicle) communications has grown significantly. However, the dynamic nature of channels in vehicu...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
The rise of innovative applications,like online gaming,smart healthcare,and Internet of Things(IoT)services,has increased demand for high data rates and seamless connectivity,posing challenges for Beyond 5G(B5G)*** is...
详细信息
The rise of innovative applications,like online gaming,smart healthcare,and Internet of Things(IoT)services,has increased demand for high data rates and seamless connectivity,posing challenges for Beyond 5G(B5G)*** is a need for cost-effective solutions to enhance spectral efficiency in densely populated areas,ensuring higher data rates and uninterrupted connectivity while minimizing *** Aerial Vehicles(UAVs)as Aerial Base Stations(ABSs)offer a promising and cost-effective solution to boost network capacity,especially during emergencies and high-data-rate ***,integrating UAVs into the B5G networks presents new challenges,including resource scarcity,energy efficiency,resource allocation,optimal power transmission control,and maximizing overall *** paper presents a UAV-assisted B5G communication system where UAVs act as ABSs,and introduces the Deep Reinforcement Learning(DRL)based Energy Efficient Resource Allocation(Deep-EERA)*** efficient DRL-based Deep Deterministic Policy Gradient(DDPG)mechanism is introduced for optimal resource allocation with the twin goals of energy efficiency and average throughput *** proposed Deep-EERA method learns optimal policies to conserve energy and enhance throughput within the dynamic and complex UAV-empowered B5G *** extensive simulations,we validate the performance of the proposed approach,demonstrating that it outperforms other baseline methods in energy efficiency and throughput maximization.
In the era of ubiquitous connectivity and the proliferation of mobile devices, the demand for efficient and secure data offloading to the cloud has become paramount. This paper presents a novel framework that supports...
详细信息
In today's world, as ecological challenges continue to rise, the importance of environmental monitoring and conservation cannot be overstated. These efforts play a vital role in countering the adverse impacts of h...
详细信息
The advent of the COVID-19 pandemic has adversely affected the entire world and has put forth high demand for techniques that remotely manage crowd-related *** surveillance and crowd management using video analysis te...
详细信息
The advent of the COVID-19 pandemic has adversely affected the entire world and has put forth high demand for techniques that remotely manage crowd-related *** surveillance and crowd management using video analysis techniques have significantly impacted today’s research,and numerous applications have been developed in this *** research proposed an anomaly detection technique applied to Umrah videos in Kaaba during the COVID-19 pandemic through sparse crowd *** theKaaba rituals is crucial since the crowd gathers from around the world and requires proper analysis during these days of the *** Umrah videos are analyzed,and a system is devised that can track and monitor the crowd flow in *** crowd in these videos is sparse due to the pandemic,and we have developed a technique to track the maximum crowd flow and detect any object(person)moving in the direction unlikely of the major *** have detected abnormal movement by creating the histograms for the vertical and horizontal flows and applying thresholds to identify the non-majority *** algorithm aims to analyze the crowd through video surveillance and timely detect any abnormal activity tomaintain a smooth crowd flowinKaaba during the pandemic.
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authenticati...
详细信息
Adaptive Frequency Hopping (AFH) is an essential generation for Cognitive Radio Networks (CRNs). It no longer bests improves spectral efficiency and quality of service of CRNs but also prevents interference amongst cu...
详细信息
暂无评论