Search
Search Results
-
An Improved Pelican Optimization Algorithm Based Residual Recurrent Neural Network for Channel Estimation with Hybrid Precoder in MIMO-OFDM System
Massive multiple input multiple output (MIMO) technology stands as a cornerstone in the evolution of 5G networks. Using an abundance of degrees of...
-
Social Assistive Robotics: An Ethical and Political Inquiry Through the Lens of Freedom
The development of social assistive robots for supporting healthcare provision faces a lack of an ethical approach that adequately addresses the...
-
Improved genetic algorithm based on reinforcement learning for electric vehicle front-end structure optimization design
The structural optimization of electric vehicles involves numerous design variables and constraints, making it a complex engineering optimization...
-
Reading Between the Lines: Machine Learning Ensemble and Deep Learning for Implied Threat Detection in Textual Data
With the increase in the generation and spread of textual content on social media, natural language processing (NLP) has become an important area of...
-
CommentClass: A Robust Ensemble Machine Learning Model for Comment Classification
Enormous amounts of data are generated in the form of feedback or comments from online platforms such as social media, e-commerce, education, and...
-
Autonomous Landing of Unmanned Aerial Vehicles: Hybrid Metaheuristic Aided Detection and Extended Kalman Filter for Localization
The majority of uses for UAVs are in precision agriculture, cinematography, aerial surveillance, military applications, disaster relief, construction...
-
A Multi-strategy Slime Mould Algorithm for Solving Global Optimization and Engineering Optimization Problems
Aiming at the problems of slow convergence, low accuracy, and easy to fall into local optimum of the slime mould algorithm (SMA), we propose an...
-
Towards Detection of DDoS Attacks in IoT with Optimal Features Selection
The exponential growth of internet-enabled devices and their interconnectedness heightens the vulnerability of technology to cyber threats. The...
-
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
Adversarial malware poses novel threats to smart devices since they grow progressively integrated into daily life, highlighting their potential...
-
A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances
With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...
-
Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach
Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...
-
Review of Deep Learning Techniques for Neurological Disorders Detection
Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...
-
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of...
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
Bilevel Optimization of the Kantorovich Problem and Its Quadratic Regularization
This paper is concerned with an optimization problem which is governed by the Kantorovich problem of optimal transport. More precisely, we consider a...
-
Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm
Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...
-
Privacy-preserving matrix factorization for recommendation systems using Gaussian mechanism and functional mechanism
Building a recommendation system involves analyzing user data, which can potentially leak sensitive information about users. As shown in numerous...