Traditionally, nonlinear data processing has been approached via the use of polynomial filters, which are straightforward expansions of many linear methods, or through the use of neural network techniques. In contrast to linear approaches, which often provide algorithms that are simple to apply, nonlinear learning machines such as neural networks demand more computing and are more likely to have nonlinear optimization difficulties, which are more difficult to solve. Kernel methods, a recently developed technology, are strong machine learning approaches that have a less complicated architecture and give a straightforward way to transforming nonlinear optimization issues into convex optimization problems. Typical analytical tasks in kernel-based learning include classification, regression, and clustering, all of which are compromised. For image processing applications, a semisupervised deep learning approach, which is driven by a little amount of labeled data and a large amount of unlabeled data, has shown excellent performance in recent years. For their part, today’s semisupervised learning methods operate on the assumption that both labeled and unlabeled information are distributed in a similar manner, and their performance is mostly impacted by the fact that the two data sets are in a similar state of distribution as well. When there is out-of-class data in unlabeled data, the system’s performance will be adversely affected. When used in real-world applications, the capacity to verify that unlabeled data does not include data that belongs to a different category is difficult to obtain, and this is especially true in the field of synthetic aperture radar image identification (SAR). Using threshold filtering, this work addresses the problem of unlabeled input, including out-of-class data, having a detrimental influence on the performance of the model when it is utilized to train the model in a semisupervised learning environment. When the model is being trained, unlabeled data that does not belong to a category is filtered out by the model using two different sets of data that the model selects in order to optimize its performance. A series of experiments was carried out on the MSTAR data set, and the superiority of our method was shown when it was compared against a large number of current semisupervised classification algorithms of the highest level of sophistication. This was especially true when the unlabeled data had a significant proportion of data that did not fall into any of the categories. The performance of each kernel function is tested independently using two metrics, namely, the false alarm (FA) and the target miss (TM), respectively. These factors are used to calculate the proportion of incorrect judgments made using the techniques.
Summary Nowadays, inter‐vehicle and intra‐vehicle communication triggers the development of safety and non‐safety applications in Vehicular Adhoc NETworks (VANET). These applications need to be evaluated before the actual implementation. The performance of these applications is generally evaluated through indispensable tools such as simulators, emulators, and testbeds. Although simulators, emulators, and testbeds are available as open‐source or proprietary for VANET applications, finding the correct tool for the experiment is intriguing and challenging from the researcher's perspective. In this paper, our focus is to provide a comprehensive survey on the existing simulators, emulators, and real time testbeds based on technical specifications, capabilities, etc. To the best of our knowledge, there is no such an exhaustive survey that exists in the literature. Further, we developed a real time low‐cost VANET testbed on our institute campus to implement the VANET related projects.
This research work is conducted to make the analysis of digital technology is one of the most admired and effective technologies that has been applied in the global context for faster data management. Starting from business management to connectivity, everywhere the application of IoT and digital technology is undeniable. Besides the advancement of the data management, cyber security is also important to prevent the data stealing or accessing from the unauthorized data. In this context the IoT security technology focusing on the safeguarding the IoT devices connected with internet. Different technologies are taken under the consideration for developing the IoT based cyber security such as Device authentication, Secure on boarding, data encryption and creation of the bootstrap server. All of these technologies are effective to its ground for protecting the digital data. In order to prevent cyber threats and hacking activities like SQL injection, Phishing, and DoS, this research paper has proposed a newer technique of the encryption process by using the python codes and also shown the difference between typical conventional system and proposed system for understanding both the system in a better way.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.