Exploring SLUG: Feature Selection Using Genetic Algorithms and Genetic Programming
We present SLUG, a recent method that uses genetic algorithms as a wrapper for genetic programming and performs feature selection while inducing models. SLUG was shown to be successful on different types of classification tasks, achieving state-of-...
Multi-robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
A map is necessary for tasks such as path planning or localization, which are common to mobile robot navigation. However, a map may be unavailable if the environment in which a robot navigates is unknown. Creating a map requires an exploration ...
Cyber Incidents Risk Assessments Using Feature Analysis
There are a variety of approaches, methods and techniques that organisations use to manage and contain the risk underlying Cybersecurity incidents throughout their digital and electronic infrastructures. Amongst these are data analysis and data ...
What Ails Cyber Insurance? An Analysis of Barriers and Drivers Using Fuzzy TOPSIS Method
The Cyber Insurance market is very puny compared to the other lines of Insurance. Despite a considerable spate of data breaches and a phenomenal increase in cybercrimes in recent years, cyber insurance does not appear to have grown proportionately,...
Integration of Synergetic IoT Applications with Heterogeneous Format Data for Interoperability Using IBM ACE
Data interoperability is a crucial requirement in IoT to improve services and enhance business opportunities and innovation. Integrating synergetic applications with heterogeneous data formats is a critical issue that needs to be addressed to ...
Segmentation of the Corpus Callosum from Brain Magnetic Resonance Images Using Dual Deep Learning Classifiers and Optimized U-Shaped Neural Networks
Segmentation of the corpus callosum (CC) from MR images is an important step in neuroimaging analysis for various applications, such as brain morphometry, tractography, and connectivity analysis. This research proposes a deep learning-based model ...
Distributed Auction-Based SFC Placement in a Multi-domain 5G Environment
- Evandro L. C. Macedo,
- Anselmo L. E. Battisti,
- Juan Lucas Vieira,
- Julia Noce,
- Paulo F. Pires,
- Débora C. Muchaluat-Saade,
- Ana C. B. Oliveira,
- Flavia C. Delicato
The fifth generation of mobile networks (5G) brings an evolution of network service provisioning through a new communication paradigm, which enables the development of new applications and improves users’ experience. With 5G, it is envisioned that ...
Vector Quantized Convolutional Autoencoder Network for LDCT Image Reconstruction with Hybrid Loss
Medical image reconstruction is the process of creating high-quality and accurate images. During acquisition, these devices capture raw measurements or signals that represent the internal structures of the human body. However, these raw ...
Object Detection at Edge Using TinyML Models
With the penetration of IoT across sectors, image classification becomes a critical issue if the computations have to be done at the edge. The evolution of low-cost devices with powerful processing for any vision-based systems leads to the next ...
Security-Based Hook Curve Master Node Key Authentication (HC-MNKA) Using Shuffle Standard Padding Encryption Crypto Policy (S2PES)
Nowadays, IoT is growing rapidly and is a security concern as there are multiple security policy violations. Furthermore, blockchain development has grown rapidly since Bitcoin first became popular. IoT security issues can be solved by Blockchain. ...
SHPIA 2.0: An Easily Scalable, Low-Cost, Multi-purpose Smart Home Platform for Intelligent Applications
Sensors, electronic devices, and smart systems have invaded the market and our daily lives. As a result, their utility in smart home contexts to improve the quality of life, especially for the elderly and people with special needs, is getting ...
Scenario-Based Approach to Solve Optimal Reactive Power Dispatch Problem with Integration of Solar Energy Using Modified Ant Line Optimizer
This paper considers a scenario-based approach, a stochastic ORPD formulation and solution that accommodates uncertain load demand, and solar power. The optimization tasks are based on the Modified Ant Line Optimizer (MALO) algorithm. PV system ...
Homomorphic Encryption Library, Framework, Toolkit and Accelerator: A Review
Homomorphic encryption ensures secure computation on encrypted data without the need for decryption beforehand. It enables the secure offloading of computations to untrusted servers. This paper provides a comprehensive description of multiple ...
A Novel and Optimized Collaborative Diversity-Driven Routing Mechanism in MANETs
Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In this research, we propose a ...
Tiling and PCA Strategy for Clustering-Based High-Dimensional Gaussian Filtering
Edge-preserving filtering is an essential tool for image processing applications and has various types of filtering. High-dimensional Gaussian filtering (HDGF) supports a wide range of edge-preserving filtering. This paper approximates HDGF by ...
Evolutionary Optimization of Convolutional Extreme Learning Machine for Remaining Useful Life Prediction
Remaining useful life (RUL) prediction is a key enabler for making optimal maintenance strategies. Data-driven approaches, especially employing neural networks (NNs) such as multi-layer perceptrons (MLPs) and convolutional neural networks (CNNs), ...
Automatic Real-Time Platoon Formation Using the Road Graph
Identifying traffic platoons and managing vehicles on the road effectively is a challenging task that is currently under investigation both in academia and the industry. The challenges include the need for fast, real-time gathering of relevant ...
Verifying the Reliability of Quantum Random Number Generator: A Comprehensive Testing Approach
Computers typically use pseudo-random numbers generated by algorithms that produce a deterministic sequence of numbers that appear random but are predictable if the entropy of the seed is disclosed. On the other hand advantage of quantum random ...
Bias Estimation Correction in Multi-Agent Reinforcement Learning for Mixed Cooperative-Competitive Environments
Multi-agent reinforcement learning (MARL) is a domain that is being actively researched in the current times. The ability of MARL algorithms in finding promising solutions to problems while having limited prior knowledge of the environment has ...
Exploring the Impact of Deep Learning Models on Lane Detection Through Semantic Segmentation
Due to advancements in the deep learning technology, object detection has become significantly important for lane detection and vehicle detection. In recent times, lane detection has become more popular as it plays a significant role in traffic ...
Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication
The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based Protocol for Resilient ...
A Fuzzy Approach to Assess Blockchain for Sustainable Transformation of Healthcare
Healthcare systems are critical infrastructure of any economy. Sustainable transformation on dimensions of social, economic, and environmental fronts is key to success of healthcare in emerging times. In this research work, we explore the role of ...
Secure Block Chain-Based Healthcare Sensitive Data Prediction Using Pragmatic Quasi-Identifiers in a Decentralized Cloud Environment
Security is essential for all facts, information sharing around the internet and maintaining personalized information. In recent days, the healthcare industry needs privacy-preserving to keep personalized data from others containing sensitive ...
ROI and Non-ROI Image Compression Using Optimal Zero Tree Wavelet and Enhanced Convolutional Neural Network for MRI Images
Medical imaging systems generate enormous amounts of information that place a heavy burden on storage and transmission. As a result, image data compression is a major research topic in the field of medical imaging. Therefore, in this paper, an ...
Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network
Over the last decade, the proliferation of Internet of Things (IoT) devices has risen dramatically. The exponential growth of IoT device ecosystems has led to a rise in the risks and cybercrimes associated with the IoT. Because of their ...
Real-Time Semantic Edge Segmentation Using Modified Channelwise Feature Pyramid
In the forthcoming decades, real-time image processing will play a crucial role in computer vision. The rise in population has resulted in a higher usage of smart devices in various industries, including the automobile, medical, and consumer ...
English–Vietnamese Machine Translation Using Deep Learning for Chatbot Applications
Recently, artificial intelligence-based machine translation has been much improved over traditional methods. A machine translator is very useful for translating text or speech from one language to another. Machine translators have replaced the ...
An IoT-Based Heart Disease Diagnosis System Using Gradient Boosting and Deep Convolution Neural Network
The tremendous strides that have been made in biotechnology and the establishment of public healthcare infrastructures have resulted in a monumental increase in the generation of sensitive and important healthcare data. When intelligent data ...
Virtual Machine Placement Using Adam White Shark Optimization Algorithm in Cloud Computing
The increasing demand for virtual machine (VM) request is caused due to the increasing number of users. Hence, the VM placement is considered as a critical task for attaining effective resource handling in cloud data centers (DCs). In general, the ...