Search
Search Results
-
-
Cyber intrusion detection using dual interactive Wasserstein generative adversarial network with war strategy optimization in wireless sensor networks
Wireless sensor network (WSN) is one of the essential components of a multi-hop cyber-physical system comprising many fixed or moving sensors. There...
-
Dual strategy for single image denoising and generation using deep neural network
Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural...
-
A method for recognizing facial expression intensity based on facial muscle variations
Expression intensity recognition is a research problem in the field of computer vision and pattern recognition, which can be understood as the...
-
Multitask EfficientNet affective computing for student engagement detection
In the realm of education, feedback emerges as a pivotal component, serving to foster engagement and interaction while also facilitating the...
-
UDCT: lung Cancer detection and classification using U-net and DARTS for medical CT images
Lung cancer is the most fatal disease in recent times. Early detection of the same is very crucial and challenging task. Therefore, proper diagnostic...
-
A systematic review of factors, data sources, and prediction techniques for earlier prediction of traffic collision using AI and machine Learning
The prevalence of road traffic collisions is a pressing issue both worldwide and within the United States. The consequences of these incidents are...
-
Research on a quantification model of online learning cognitive load based on eye-tracking technology
Online learning is characterized by a high degree of complexity and a wealth of information when compared to traditional classroom learning. This can...
-
eFuseNet: A deep ensemble fusion network for efficient detection of Arrhythmia and Myocardial Infarction using ECG signals
Myocardial infarction (MI) and cardiac arrhythmias remain leading causes of mortality within cardiovascular diseases. Accurate and timely diagnosis...
-
Designing interactive, gamified learning environments: a methodological approach with a case study on statistical quality control
Statistical Quality Control is a subject present in many engineering degrees. Literature identifies shortcomings in the application of Statistical...
-
Secure speaker identification in open and closed environments modeled with symmetric comb filters
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication...
-
Advanced dairy cow monitoring: enhanced detection with precision 3D tracking
Ensuring the welfare of dairy cows requires precise monitoring of their daily exercise to evaluate their physical health. This necessitates...
-
Sublinear Algorithms in T-Interval Dynamic Networks
We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...
-
Advancing lung cancer diagnosis with bio-inspired algorithms: a comprehensive assessment
Lung cancer is a prevalent and deadly disease with a high global incidence rate. For efficient treatment with a positive prognosis for patients,...
-
The Multi-attribute impact of hyperlinks in blogs: an emotion-centric approach
As a digital social medium, blogs have transformed into arenas where individuals can express their perspectives, concepts, and feelings. This...
-
Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone
This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...
-
HyperMatch: long-form text matching via hypergraph convolutional networks
Semantic text matching plays a vital role in diverse domains, such as information retrieval, question answering, and recommendation. However, longer...
-
Hierarchical adaptive evolution framework for privacy-preserving data publishing
The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...
-
Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System
Wireless systems enable people in last decades to communicate and access applications and information without wires, which provided better image,...