Optimization-enabled deep convolutional network for the generation of normal speech from non-audible murmur based on multi-kernel-based features

T Rajesh Kumar, GR Suresh… - International Journal of …, 2022 - World Scientific
Automatic Speech Recognition schemes are the alternating modes in which individuals
interrelate with various mobile application applications. The user interactivity needs are a …

Exponentially‐spider monkey optimization based allocation of resource in cloud

P Kalpana, S Nagendra Prabhu… - … Journal of Intelligent …, 2022 - Wiley Online Library
The increasing desire for distributed computing systems has attracted huge interest in
memory and computing resources. The cloud provides on‐demand access to provide a …

BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection

A Abirami, S Palanikumar - Computers and Electrical Engineering, 2023 - Elsevier
Currently, the wireless networks are increasingly used in all kinds of applications due to their
adaptability, flexibility, and easy-access. Without a predetermined architecture, wireless …

[HTML][HTML] An End-Process Blockchain-Based Secure Aggregation Mechanism Using Federated Machine Learning

WE Mbonu, C Maple, G Epiphaniou - Electronics, 2023 - mdpi.com
Federated Learning (FL) is a distributed Deep Learning (DL) technique that creates a global
model through the local training of multiple edge devices. It uses a central server for model …

Weighted 1D-local binary pattern features and Taylor-Henry gas solubility optimization based Deep Maxout network for discovering epileptic seizure using EEG

G Jaffino, M Sundaram, JP Jose - Digital Signal Processing, 2022 - Elsevier
Epilepsy represents chaos in nerves which can affect the world's population. Such type of
abnormal activities of the brain can lead to seizures. Hence, precise and timely treatment of …

Automation of recon process for ethical hackers

VR Saraswathi, IS Ahmed, SM Reddy… - … for Advancement in …, 2022 - ieeexplore.ieee.org
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …

Intrusion detection system for IoMT through blockchain-based federated learning

B Zaabar, O Cheikhrouhou… - 2022 15th International …, 2022 - ieeexplore.ieee.org
Federated Learning (FL) is a feasible technology to collaboratively train a model without
sharing private data. This approach differs from traditional machine learning techniques …

Heart Disease Prediction Using Decision Tree and SVM

R Vijaya Saraswathi, K Gajavelly… - Proceedings of Second …, 2022 - Springer
Heart disease is a most lethal condition in the current days. Historical numeric data shows
that death rate due to cardiac arrest is high. Thus, it is important to diagnose the condition as …

Exponential Sailfish Optimizer-based generative adversarial network for image annotation on natural scene images

R Tripuraribhatla - Gene Expression Patterns, 2022 - Elsevier
Generally, automatic image annotation can offer semantic graphics for recognizing image
contents, and it creates a base for devising various techniques, which can search images in …

Optimization enabled deep learning method in container-based architecture of hybrid cloud for portability and interoperability-based application migration

TC Hiremath, R KS - Journal of Experimental & Theoretical Artificial …, 2022 - Taylor & Francis
Virtualisation is a major part of the cloud as it permits the deployment of several virtual
servers over the same physical layer. Due to the adaption of cloud services, the count of the …