The Internet ofThings(IoT)and edge computing have substantially contributed to the development and growth of smart *** handled time-constrained services and mobile devices to capture the observing environment for surv...
详细信息
The Internet ofThings(IoT)and edge computing have substantially contributed to the development and growth of smart *** handled time-constrained services and mobile devices to capture the observing environment for surveillance *** systems are composed of wireless cameras,digital devices,and tiny sensors to facilitate the operations of crucial healthcare ***,many interactive applications have been proposed,including integrating intelligent systems to handle data processing and enable dynamic communication functionalities for crucial IoT ***,most solutions lack optimizing relayingmethods and impose excessive overheads for maintaining devices’***,data integrity and trust are another vital consideration for nextgeneration *** research proposed a load-balanced trusted surveillance routing model with collaborative decisions at network edges to enhance energymanagement and resource *** leverages graph-based optimization to enable reliable analysis of decision-making ***,mobile devices integratewith the proposed model to sustain trusted routes with lightweight privacy-preserving and *** proposed model analyzed its performance results in a simulation-based environment and illustrated an exceptional improvement in packet loss ratio,energy consumption,detection anomaly,and blockchain overhead than related solutions.
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
Network function virtualisation (NFV) offers several benefits to both network operators and end users. It is a more programmable and low-cost solution as compared to a traditional network. Since the network functions ...
详细信息
Early retinal disease diagnosis and treatment are essential for preventing the irreversible vision impairment. The patients in the clinical settings have various kinds of retinal disorders. Fundus image categorization...
详细信息
Early retinal disease diagnosis and treatment are essential for preventing the irreversible vision impairment. The patients in the clinical settings have various kinds of retinal disorders. Fundus image categorization is a multiple label categorization task since a fundus image contains one or more disorders. However, most previous research has focused on the diagnosis of a single fundus problem and there remain substantial obstacles to the simultaneous diagnosis of several fundus conditions. In this research work, Multi-Label Classification of Fundus Images with Optimized vision transformer based Wasserstein Deep Convolutional Generative Adversarial Network (MLC-FI-VF-WDCGAN) is proposed to accurately classify the Fundus disease images. Initially, the input image data is collected from Ocular Disease Intelligent Recognition (ODIR) dataset. The input images are preprocessed with Multivariate Fast Iterative Filtering (MFIF) for eliminating the noise and increasing the quality of input imageries. The pre-processing images are given to Multi-scale Neighborhood Feature Extraction (MS-NFE) method for extracting features such as, Geometric Features, Blood Vessel and Vascular Tortuosity for enhancing the classification accuracy. Then, the extracted features are provided to vision transformer based Wasserstein Deep Convolutional Generative Adversarial Network (VF-WDCGAN) for classifying the Fundus disease as Normal, Diabetic retinopathy, Glaucoma, Cataract, Hypertensive retinopathy and Myopia. The Vision-transformer acts as Discriminator in the WDCGAN and doesn’t reveal any adoption of optimization methods for calculating the ideal parameters in improved categorization accuracy. Hence, Giza Pyramids Construction Algorithm (GPCA) is proposed to improve the weight parameters of VF-WDCGAN. The MLC-FI-VF-WDCGAN technique is implemented in python and evaluated using several performances metrics such as accuracy, precision, recall. The performance of proposed MLC-FI-VF-WDCGAN met
Vehicular ad hoc networks (VANETs) are an essential element and building block of the autonomous vehicle system. VANETs, a subcategory of mobile ad hoc networks (MANETs), stand out due to certain predetermined attribu...
详细信息
In the evolving landscape of smart cities, employment strategies have been steering towards a more personalized approach, aiming to enhance job satisfaction and boost economic efficiency. This paper explores an advanc...
详细信息
We present a conversational social robot behaviour design that draws from psychotherapy research to support individual self-reflection and wellbeing, without requiring the robot to parse or otherwise understand what t...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
Alzheimer's disease is the most prevalent cause of dementia, and its early diagnosis is crucial to prevent the progression to severe stages where cognitive abilities are severely impaired. This research paper pres...
详细信息
The increasing complexity of cryptocurrency markets necessitates the development of efficient portfolio management tools that provide real-time tracking, price updates, and market awareness. This paper focuses on an a...
详细信息
暂无评论