The <span>next-generation communication system incorporates information technology (IT) and operations technology (OT) for generating, delivering, and collecting, and obtaining communication power. We plan to include a brief outline of internet of thing (IoT) communication and its context, along with security concerns that arise for IoT data on the network and some methods for detecting and avoiding cyber security threats. With the rise of the 5G networks, we introduce the smart network's emergent technology and its opportunities and more cybersecurity issues. Whereas, finding or responding to a power outage is an essential part of system security That is why we will discuss the innumerable advantages of 5G networks and we must also cover the inevitable problems that we will encounter in power delivery. The use of smart IoT communication technologies is becoming more common in the energy sector, particularly with the network (5G. The smart network and energy flow integration Real-time data on generation, electricity distribution, and energy consumption is measured using computers and cutting-edge technologies. This information aids utility companies in managing electricity supply and demand, as well as price. While enhanced communication and information technologies are unquestionably crucial to </span>the smart network.
Today the whole world suffers and fears the epidemic of the Coronavirus and the developed waves in it, as we have now reached the fourth wave, and this is a serious matter. Where the statistics of the Coronavirus in the current data showed that 213 countries are affected by this epidemic, and about 6 millions of deaths are recorded. This virus spreads rapidly, and patients mainly suffer from breathing. The patient who suffers from pre-existing health problems will be more likely to contract this disease, so there was an urgent need for artificial intelligence to enter to quickly detect this virus, so the world turned to deep learning, which is one of the most powerful methods and techniques for classification because of its use of Bayas Rule, where there is no possibility of error. This paper proposes CNN (Convolutional Neural Networks) and PNN (Proprestitc Neural Networks) mixed tomography scanning model to classify Covid-19 images, the proposed network called the CNN-PNN model. The CNN-PNN model can use CNN to compute the dependency and continuity features of the output of the middle layer of the PNN model, and correlate the properties of these middle levels with the final full network to predict the classification.
Image restoration is one of the digital image processing techniques used to repaint or restore image information. One common problem encountered during restoration is image blurring. To solve this problem, a new de-blurring technique was proposed to reduce or remove image blurring. The proposed filter was designed using the least square interpolation calculation controlled by the neural network to select the blurred pixels. The wavelet decomposition technique was used to improve the performance of the proposed filter, which showed good results for fully and partially blurred regions in images.
<p><span>The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt to build robust cryptographic keys, because, human users detect difficulties to call up long cryptographic keys. Biometric recognition provides an authentic solution to the authentication of the user problem in the identity administration systems. With the extensive utilization of biometric methods in different applications, there is growing concern about the confidentiality and security of the biometric technologies. This paper proposes biometric based key recreation scheme. Since human ears are not correlated. Until now, the encryption keys are generated using a swarm intelligence approach. Collective intelligence of simple groups of autonomous agents have been emerged by swarm intelligence. The crow search algorithm which is known as (CSA) is a new meta-intuitive method assembled by the intelligent group behavior of crows. Despite that CSA demonstrates important features, its search approach poses excessive challenges while faced with great multimodal formularization.</span></p>
Image annotation is the natural language description for essential blobs within an Image. Many methodologies have recruited to reveal image semantics and represent it as annotation. Due to the exclusionary growth of number of images distributed over massive repositories, the task of manual annotation is tedious and over killing in term of times and efforts. This paper is presenting automatic annotation system based on the interaction between intelligent agents. Agent interaction is synonym to socialization behavior dominating Agent society. The presented system is exploiting knowledge evolution revenue due to the socialization to charge up the annotation process
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.