In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,*** the same time,proper localization of...
详细信息
In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,*** the same time,proper localization of nodes in real time wireless networks helps to improve the overall functioning of *** study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization(IM-EECNL)approach for real-time wireless *** proposed IM-EECNL technique involves two major processes namely node localization and ***,Chaotic Water Strider Algorithm based Node Localization(CWSANL)technique to determine the unknown position of the ***,an Oppositional Archimedes Optimization Algorithm based Clustering(OAOAC)technique is applied to accomplish energy efficiency in the ***,the OAOAC technique derives afitness function comprising residual energy,distance to cluster heads(CHs),distance to base station(BS),and *** performance validation of the IM-EECNL technique is carried out under several aspects such as localization and energy efficiency.A wide ranging comparative outcomes analysis highlighted the improved performance of the IM-EECNL approach on the recent approaches with the maximum packet delivery ratio(PDR)of 0.985.
This paper introduces a dynamic-frame time division multiple access (DF-TDMA) scheme aimed at decreasing the age of collection (AoC) in collaborative monitoring scenarios. Unlike the conventional age of information (A...
详细信息
There are mainly two problems with traditional k-shell centrality in complex networks. First, the traditional k-shell centrality divides many nodes into the same shell layer, which cannot accurately distinguish the pr...
详细信息
Semi-supervised-Learning(SSL) providing a solution to leverage vast amounts of unlabeled data. In cognitive psychology, the Primacy-effect refers to the phenomenon where the initial information encountered tends to le...
详细信息
With the continuous advancement of the smart home market, household items have become more intelligent. By identifying the different material attributes of various household tabletops, we can obtain contextual informa...
详细信息
Nowadays,commercial transactions and customer reviews are part of human life and various business *** technologies create a great impact on online user reviews and activities,affecting the business *** reviews and rat...
详细信息
Nowadays,commercial transactions and customer reviews are part of human life and various business *** technologies create a great impact on online user reviews and activities,affecting the business *** reviews and ratings are more helpful to the new customer to purchase the product,but the fake reviews completely affect the *** traditional systems consume maximum time and create complexity while analyzing a large volume of customer ***,in this work optimized recommendation system is developed for analyzing customer reviews with minimum ***,Amazon Product Kaggle dataset information is utilized for investigating the customer *** collected information is analyzed and processed by batch normalized capsule networks(NCN).The network explores the user reviews according to product details,time,price purchasing factors,etc.,ensuring product quality and *** effective recommendation system is developed using a butterfly optimized matrix factorizationfiltering *** the system’s efficiency is evaluated using the Rand Index,Dunn index,accuracy,and error rate.
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict softwa...
详细信息
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict software bugs,but a more precise and general approach is *** bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning ***,these studies are not generalized and efficient when extended to other ***,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification *** methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a *** National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were *** reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode.
To efficiently complete a complex computation task,the complex task should be decomposed into subcomputation tasks that run parallel in edge *** Sensor Network(WSN)is a typical application of parallel *** achieve high...
详细信息
To efficiently complete a complex computation task,the complex task should be decomposed into subcomputation tasks that run parallel in edge *** Sensor Network(WSN)is a typical application of parallel *** achieve highly reliable parallel computation for wireless sensor network,the network's lifetime needs to be ***,a proper task allocation strategy is needed to reduce the energy consumption and balance the load of the *** paper proposes a task model and a cluster-based WSN model in edge *** our model,different tasks require different types of resources and different sensors provide different types of resources,so our model is heterogeneous,which makes the model more *** we propose a task allocation algorithm that combines the Genetic Algorithm(GA)and the Ant Colony Optimization(ACO)*** algorithm concentrates on energy conservation and load balancing so that the lifetime of the network can be *** experimental result shows the algorithm's effectiveness and advantages in energy conservation and load balancing.
In this modern digital era, the increasing volume of textual data and the widespread adoption of natural language processing (NLP) techniques have presented a critical challenge in safeguarding sensitive privacy infor...
详细信息
In this modern digital era, the increasing volume of textual data and the widespread adoption of natural language processing (NLP) techniques have presented a critical challenge in safeguarding sensitive privacy information. As a result, there is a pressing demand to design robust and accurate NLP-based techniques to perform efficient sensitive information detection in textual data. This research paper focuses on the detection and classification of sensitive privacy information in textual documents using NLP by proposing a novel algorithm named Privacy BERT-LSTM. The proposed Privacy BERT-LSTM algorithm employs BERT for obtaining contextual embeddings and LSTM for sequential information processing, facilitating efficient sensitive information detection in textual documents. The BERT with its bidirectional characteristics captures the nuances and meaning of the textual documents, while the LSTM derives the long-range dependencies in the textual data. Moreover, the proposed Privacy BERT-LSTM algorithm with its attention mechanism highlights the important regions of the textual documents, contributing to efficient sensitive information detection. The comprehensive performance evaluation is conducted by employing the SMS Spam Collection dataset in terms of standard performance metrics and comparing it with different state-of-the-art techniques, namely, CASSED, PRIVAFRAME, CNN-LSTM, Conv-FFD, GCSA, TSIIP, and, C-PIIM. The experimental outcomes clearly illustrate that the Privacy BERT-LSTM algorithm demonstrates superior performance in identifying various types of sensitive information by achieving an accuracy of 92.50%, F1-score of 85.02%, and Precision of 89.36%. The proposed algorithm outperforms existing baseline models, providing valuable advancements in sensitive information detection using NLP. Therefore, this research contributes to the advancement of privacy protection in NLP applications and opens avenues for future investigations in the domain of sensitive info
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o...
详细信息
暂无评论