Chinese Physics B,
Journal Year:
2024,
Volume and Issue:
33(6), P. 060310 - 060310
Published: March 15, 2024
We
redesign
the
parameterized
quantum
circuit
in
deep
neural
network,
construct
a
three-layer
structure
as
hidden
layer,
and
then
use
classical
optimization
algorithms
to
train
circuit,
thereby
propose
novel
hybrid
network
(HQDNN)
used
for
image
classification.
After
bilinear
interpolation
reduces
original
suitable
size,
an
improved
enhanced
representation
(INEQR)
is
encode
it
into
states
input
of
HQDNN.
Multi-layer
circuits
are
main
implement
feature
extraction
The
output
results
converted
data
through
measurements
optimized
on
computer.
To
verify
performance
HQDNN,
we
conduct
binary
classification
three
experiments
MNIST
(Modified
National
Institute
Standards
Technology)
set.
In
first
classification,
accuracy
0
4
exceeds
98%.
Then
compare
with
other
algorithms,
two
datasets
show
that
higher
than
general
convolutional
network.
International Journal of Emerging Technologies in Learning (iJET),
Journal Year:
2023,
Volume and Issue:
18(01), P. 176 - 200
Published: Jan. 10, 2023
The
field
of
Engineering
is
that
which
needs
a
high
level
analytical
thinking,
intuitive
knowledge,
and
technical
know-how.
area
communication
engineering
deals
with
different
components
including,
wireless
mobile
services,
radio,
broadband,
web
satellites.
There
rapid
decline
in
the
quality
students
produced
by
faculties
as
result
sufficient
methods
frameworks
student
assessment.
production
high-potential
engineers
limited
utilization
old
traditional
education
methodology
frameworks.
presentation
estimation
system
institution
motionless
manual.
Usually,
assessment
student’s
performance
using
to
use
students’
scores,
while
failing
evaluate
their
based
on
activities
or
practical
applications.
In
addition,
such
systems
do
not
take
cognizance
individual
knowledge
connects
within
learning
environment.
Recently,
institutions
have
started
paying
attention
evaluation
solutions
are
networks
Internet
Things
(IoT).
Therefore,
this
study,
an
automated
has
been
proposed
for
students.
designed
IoT
aim
improving
process
virtual
education.
data
used
study
collected
through
sensors
premises
college,
pre-processed
normalization.
After
was
pre-processed,
it
stored
cloud.
order
enable
classification
activity,
Adaptive
Layered
Bayesian
Belief
Network
(AL-BBN)
classifier
work.
scores
calculated
fuzzy
logic,
Multi-Gradient
Boosting
Decision
Tree
(MGBDT)
decision
making.
python
simulation
tool
employed
implementation
system,
benchmarks
done
well.
Based
findings
conceptual
model
outperformed
existing
ones
terms
online
learning.
International Journal of Online and Biomedical Engineering (iJOE),
Journal Year:
2022,
Volume and Issue:
18(12), P. 89 - 105
Published: Sept. 14, 2022
This
research
is
aimed
at
planning
the
manner
in
which
secure
5G
communication
can
be
controlled
based
on
traffic
floods.
To
accomplish
excellent
administration
execution
of
organization
observing
and
directing
calculation
inescapable,
dynamic
steering
actual
equipment
isn't
reasonable
for
practical
plans
action.
Accordingly,
to
bring
down
functional
capital
consumption,
we
propose
a
strategy
called
versatile
made
do
with
help
(Quality
Service
MANET
(Mobile
specially
appointed
Network).
A
model
will
fulfilling
needs
customers
simultaneously
gives
huge
investment
funds
item
cost
convenience
was
presented
this
paper.
perform
steering,
planned
geography
virtualized
climate.
We
customized
CHAOS
network
flood
board
goes
about
as
consistent
northward
API
directing.
Network
infused
dynamically
from
1MB
up
10MB
(connect
b/w)
progressive
way
similar
10
occurrences.
In
conclusion,
performed
applying
control
hypothetical
method
assistance
calculations.
By
looking
two
situations,
noticed
prominent
distinction
throughput
controlling
application
MANETs.
data
refreshed
after
clockwork.
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(08), P. 113 - 134
Published: April 26, 2023
In
the
realm
of
robotics
and
interactive
systems,
gender
recognition
is
a
crucial
problem.
Considering
several
uses
it
has
in
security,
web
search,
human-computer
interactions,
etc.,
from
facial
photos
garnered
lot
attention.
The
need
to
use
enhance
techniques
felt
more
strongly
today
due
significant
development
design
systems.
Relatively
speaking
other
approaches,
progress
gained
this
area
thus
far
not
exceptional.
Thus,
novel
method
been
adopted
study
improve
accuracy
comparison
earlier
research.
To
create
best
rate
efficiency
suggested
research,
we
choose
minimal
set
characteristics.
Testing
on
FERET
UTK-Face
datasets
reveals
that
our
algorithm
lower
degree
inaccuracy.
article,
input
image
person's
face
pre-processed
extract
right
features
once
recognized.
Gender
separation
achieved
using
Multi-class
Support
Vector
Machine
(SVM)
Classifiers
after
normalized
images
have
extracted
Histogram
Oriented
Gradient
(HOG),
Gabor
Filters,
Speeded
Up
Robust
Features
(SURF),
as
well
their
combination
select
most
appropriate
feature
them
for
classification.
As
reduction
feature,
Principal
Component
Analysis
(PCA)
also
employed.
Using
proposed
approach,
98.75%
precision
accomplished
database
runtime
performance
0.4
Sec.
database,
97.43%
0.5
Wasit Journal of Computer and Mathematics Science,
Journal Year:
2022,
Volume and Issue:
1(2), P. 1 - 7
Published: June 30, 2022
Finger
vein
biometrics
have
gained
a
lot
of
attention
in
recent
years
because
they
offer
the
perfect
balance
security
and
economic
viability,
with
advantages
such
as
being
least
susceptible
to
identity
theft
veins
are
present
beneath
skin,
unaffected
by
ageing
person,
etc.
All
these
factors
make
it
necessary
create
functioning
models
meet
ever-increasing
need
for
security.
The
use
facial
recognition
AI-based
biometrics,
particularly
law
enforcement,
has
become
hot
topic
its
inadvertent
demographic
bias.
Biometric
bias,
on
other
hand,
far-reaching
consequences
that
extend
into
daily
cases.
When
an
ATM
transaction
or
online
banking
is
compromised
false
positive
negative
verification,
fraudulent
activity
made
easier.
study
this
research
work
focused
difficulty
determining
fingertip.
On
two
widely
used
freely
available
datasets
finger
veins,
we
applied
deep
convolutional
neural
network
feature
extraction.
gotten
interest
recently
novel
biometric
technique.
might
benefit
from
applying
learning,
end-to-end
approach
shown
promising
results
sectors
like
face
target
detection.
Wasit Journal of Computer and Mathematics Science,
Journal Year:
2022,
Volume and Issue:
1(3), P. 1 - 9
Published: Sept. 30, 2022
Vehicular
Ad
hok
Networks
(VANET)
is
an
emerging
technology
with
both
a
bright
future
and
significant
concerns,
particularly
in
terms
of
security.
This
study
focuses
on
three-part
VANET
security
frameworks.
The
first
gives
thorough
review
the
needs,
difficulties,
characteristics
In
order
to
create
secure
architecture
effective
party
communication,
certain
needs
should
be
taken
into
account.
We
provide
information
current
designs
as
well
widely
used
standard
protocols.
second
concentrates
brand-new
categorization
various
assaults
described
literature
remedies
that
go
them.
third
compares
few
these
options
using
established
standards
for
VANET.
Then,
assist
researchers
usage,
we
call
attention
many
outstanding
topics
technological
obstacles
linked
Electric Power Systems Research,
Journal Year:
2024,
Volume and Issue:
235, P. 110677 - 110677
Published: July 3, 2024
This
paper
explores
the
potential
application
of
quantum
and
hybrid
quantum–classical
neural
networks
in
power
flow
analysis.
Experiments
are
conducted
using
two
datasets
based
on
4-bus
33-bus
test
systems.
A
systematic
performance
comparison
is
also
among
quantum,
quantum–classical,
classical
networks.
The
(i)
generalization
ability,
(ii)
robustness,
(iii)
training
dataset
size
needed,
(iv)
error,
(v)
process
stability.
results
show
that
developed
network
outperforms
both
networks,
hence
can
improve
deep
learning-based
analysis
noisy-intermediate-scale
(NISQ)
fault-tolerant
(FTQ)
era.
International Journal of Online and Biomedical Engineering (iJOE),
Journal Year:
2024,
Volume and Issue:
20(03), P. 99 - 114
Published: Feb. 27, 2024
This
paper
analyzes
the
application
of
artificial
intelligence
(AI)
techniques
in
lean
construction
(LC)
and
their
potential
to
enhance
project
management
(PM)
for
improved
cost
schedule
efficiency.
The
PRISMA
methodology
is
used
select
relevant
articles
four
steps.
Furthermore,
a
bibliometric
analysis
keywords
occurrences
conducted.
study
emphasizes
different
methods
utilizing
tools
AI
attain
optimal
results
industry.
By
combining
variety
techniques,
it
possible
create
an
environment
that
fosters
outcomes
while
minimizing
risks
inefficiencies.
According
reviewed,
LC
its
are
becoming
increasingly
general
practice
(GP).
Machine
learning
(ML)
particularly
neural
networks
(ANN),
have
been
extensively
researched
as
tool
projects
by
delays,
fostering
collaboration,
cutting
costs,
saving
time,
boosting
productivity.
Combining
with
ML
can
profitability
align
principles,
leading
successful
projects.
International Journal of Emerging Technologies in Learning (iJET),
Journal Year:
2023,
Volume and Issue:
18(03), P. 110 - 127
Published: Feb. 15, 2023
The
study
of
cooperative
education
is
important
not
only
for
researchers
but
also
those
interested
in
studying
educational
methods,
such
as
university
professors,
teachers
schools,
and
all
institutions.
This
because
its
effectiveness
teaching
students,
developing
their
skills,
ideas
employing
them
the
finding
appropriate
solutions
to
questions
posed
by
teacher.
It
helps
instilling
a
spirit
cooperation
among
students
dividing
into
groups
achieve
desired
goals.
aim
clarify
how
it
use
addressing
educational,
social
psychological
aspects
when
divided
three
sections.
first
section
presents
general
framework
dealing
with
problem,
importance
objectives.
second
deals
concept
education,
date
inception.
discusses
most
theories
that
I
mentioned
about
importance,
results,
foundations
objectives
including
benefits,
characteristics,
stages
strategies.
clarifies
role
teacher
student
e-learning.
third
topic
dealt
methodology
research
presentation
interpretation
discussion.
reached
several
conclusions,
which
are:
staff
institutions
enjoy
high
level
economic
goals,
were
significant
used.
Computers, materials & continua/Computers, materials & continua (Print),
Journal Year:
2024,
Volume and Issue:
79(2), P. 2609 - 2623
Published: Jan. 1, 2024
The
use
of
privacy-enhanced
facial
recognition
has
increased
in
response
to
growing
concerns
about
data
security
and
privacy
the
digital
age.This
trend
is
spurred
by
rising
demand
for
face
technology
a
variety
industries,
including
access
control,
law
enforcement,
surveillance,
internet
communication.However,
usage
created
serious
monitoring
user
preferences,
especially
context-aware
systems.In
these
problems,
this
study
provides
novel
framework
that
integrates
sophisticated
approaches
such
as
Generative
Adversarial
Networks
(GANs),
Blockchain,
distributed
computing
solve
while
maintaining
exact
recognition.The
framework's
painstaking
design
execution
strive
strike
compromise
between
precise
protecting
personal
integrity
an
increasingly
interconnected
environment.Using
cutting-edge
tools
like
Dlib
analysis,
Ray
Cluster
computing,
Blockchain
decentralized
identity
verification,
proposed
system
scalable
secure
analysis
privacy.The
study's
contributions
include
creation
sustainable
solution
privacy-aware
recognition,
implementation
flexible
based
on
networks,
demonstration
higher
performance
over
previous
methods.Specifically,
StyleGAN
model
outstanding
accuracy
rate
93.84%
processing
high-resolution
images
from
CelebA-HQ
dataset,
beating
other
evaluated
models
Progressive
GAN
90.27%,
CycleGAN
89.80%,
MGAN
80.80%.With
improvements
accuracy,
speed,
protection,
great
promise
practical
fields
need
technology.This
paves
way
future
research
systems,
emphasizing
significance
using
meet
issues
identity.