Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat...
详细信息
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance...
详细信息
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhances the prediction performance of classifiers when tested on unseen *** learning(DL)models have a lot of parameters,and they frequently ***,to avoid overfitting,data plays a major role to augment the latest improvements in ***,reliable data collection is a major limiting ***,this problem is undertaken by combining augmentation of data,transfer learning,dropout,and methods of normalization in *** this paper,we introduce the application of data augmentation in the field of image classification using Random Multi-model Deep Learning(RMDL)which uses the association approaches of multi-DL to yield random models for *** present a methodology for using Generative Adversarial Networks(GANs)to generate images for data *** experiments,we discover that samples generated by GANs when fed into RMDL improve both accuracy and model *** across both MNIST and CIAFAR-10 datasets show that,error rate with proposed approach has been decreased with different random models.
In a network design, the control plane and the data plane are separated by the architectural concept of software defined networking (SDN). A centralised controller that serves as the only point of control for the whol...
详细信息
The purpose of this study is to develop and investigate a new rough clustering based on optimization. We propose a restructured algorithm using only one variable, instead of the algorithm described using two variables...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
Massive-Multiple Inputs and Multiple Outputs(M-MIMO)is considered as one of the standard techniques in improving the performance of Fifth Generation(5G)radio.5G signal detection with low propagation delay and high thr...
详细信息
Massive-Multiple Inputs and Multiple Outputs(M-MIMO)is considered as one of the standard techniques in improving the performance of Fifth Generation(5G)radio.5G signal detection with low propagation delay and high throughput with minimum computational intricacy are some of the serious concerns in the deployment of *** evaluation of 5G promises a high quality of service(QoS),a high data rate,low latency,and spectral efficiency,ensuring several applications that will improve the services in every *** existing detection techniques cannot be utilised in 5G and beyond 5G due to the high complexity issues in their *** the proposed article,the Approximation Message Passing(AMP)is implemented and compared with the existing Minimum Mean Square Error(MMSE)and Message Passing Detector(MPD)*** outcomes of the work show that the performance of Bit Error Rate(BER)is improved with minimal complexity.
In today’s digital era,the text may be in form of *** research aims to deal with the problem by recognizing such text and utilizing the support vector machine(SVM).A lot of work has been done on the English language ...
详细信息
In today’s digital era,the text may be in form of *** research aims to deal with the problem by recognizing such text and utilizing the support vector machine(SVM).A lot of work has been done on the English language for handwritten character recognition but very less work on the under-resourced Hindi language.A method is developed for identifying Hindi language characters that use morphology,edge detection,histograms of oriented gradients(HOG),and SVM classes for summary *** rank employs the summary to extract essential phrases based on paragraph position,phrase position,numerical data,inverted comma,sentence length,and keywords *** primary goal of the SVM optimization function is to reduce the number of features by eliminating unnecessary and redundant *** second goal is to maintain or improve the classification system’s *** experiment included news articles from various genres,such as Bollywood,politics,and *** proposed method’s accuracy for Hindi character recognition is 96.97%,which is good compared with baseline approaches,and system-generated summaries are compared to human *** evaluated results show a precision of 72%at a compression ratio of 50%and a precision of 60%at a compression ratio of 25%,in comparison to state-of-the-art methods,this is a decent result.
We introduce spatial channel networks (SCNs) to the interconnection of data center networks (DCNs). We propose an integer linear programming (ILP) model to solve the routing and spectrum assignment problem for SCN-bas...
详细信息
In order to test the processing ability and receiving detection ability of wireless communication receiver for multi-path fading and white Gaussian noise, it is necessary to simulate the carrier signal and a variety o...
详细信息
Road safety is of prime importance as road accidents are among the biggest causes of deaths in the country. Road Accidents are majorly due to violators and lawbreakers of road safety rules like not wearing helmets, tr...
详细信息
暂无评论