International Journal of Intelligent Networks最新文献

筛选
英文 中文
An efficient automatic brain tumor classification using optimized hybrid deep neural network 基于优化混合深度神经网络的高效脑肿瘤自动分类
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.11.003
S. Shanthi , S. Saradha , J.A. Smitha , N. Prasath , H. Anandakumar
{"title":"An efficient automatic brain tumor classification using optimized hybrid deep neural network","authors":"S. Shanthi ,&nbsp;S. Saradha ,&nbsp;J.A. Smitha ,&nbsp;N. Prasath ,&nbsp;H. Anandakumar","doi":"10.1016/j.ijin.2022.11.003","DOIUrl":"10.1016/j.ijin.2022.11.003","url":null,"abstract":"<div><p>A significant topic of investigation in the area of medical imaging is brain tumor classification. Since precision is significant for classification, computer vision researchers have developed several approaches, but they still struggle with poor accuracy. In this paper, an automatic optimized hybrid deep neural network (OHDNN) is suggested for brain tumors. The proposed approach consists of two phases such as pre-processing and brain tumor classification. At first, the images are composed of the data, and then the collected imageries are pre-processed by using the following steps such as image enhancement and noise removal. Then the pre-processed images are fed to the classification stage. For the classification process, in this paper, OHDNN is used. The HDNN is a combination of a convolution neural network and long short-term memory (CNN-LSTM). Here, the CNN classifier is used for feature map generation and the classification process LSTM classifier is used. Besides, to improve the performance of the CNN-LSTM classifier, the parameter extant in the classifiers is randomly selected utilizing the adaptive rider optimization (ARO) algorithm. For the experimental process, an MRI image dataset is utilized. The experimental results show proposed approach attained the maximum accuracy of 97.5.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 188-196"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000239/pdfft?md5=4f4b0efe7d943431b7e6ab7b8342a453&pid=1-s2.0-S2666603022000239-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80694039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Machine learning and quantum computing for 5G/6G communication networks - A survey 5G/6G通信网络的机器学习和量子计算-调查
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.11.004
Suriya M
{"title":"Machine learning and quantum computing for 5G/6G communication networks - A survey","authors":"Suriya M","doi":"10.1016/j.ijin.2022.11.004","DOIUrl":"https://doi.org/10.1016/j.ijin.2022.11.004","url":null,"abstract":"<div><p>Recently fifth generation (5G) and beyond applications are evolving, which demands more computational and complex data processing. Quantum computing and quantum learning algorithms are incorporated to enhance processing capabilities and data computation compared to conventional machine learning approaches. This study presents the significance of quantum computing and quantum machine learning models and their research challenges concerning 5G and beyond applications. The researchers focus on global coverage, enhanced spectrum support, increased energy and cost efficiency, high security, and dynamic intelligence, along with big data processing that demands complex data structures and algorithms.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 197-203"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000240/pdfft?md5=db0140218702517bb55e207933ca8c9e&pid=1-s2.0-S2666603022000240-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137227980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remora optimization algorithm-based optimized node clustering technique for reliable data delivery in VANETs 基于Remora优化算法的优化节点聚类技术在VANETs中实现可靠的数据传输
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.07.002
Swathi Konduru , M. Sathya
{"title":"Remora optimization algorithm-based optimized node clustering technique for reliable data delivery in VANETs","authors":"Swathi Konduru ,&nbsp;M. Sathya","doi":"10.1016/j.ijin.2022.07.002","DOIUrl":"10.1016/j.ijin.2022.07.002","url":null,"abstract":"<div><p>Vehicular ad hoc Network (VANET) is one of the recently growing trends which motivate the provision of several service providers in the urban areas. In VANETs, the vehicles represent the nodes in the network topology that needs to guarantee better cooperation when there is a higher node density. Moreover, the problem of determining an optimal route and achieving network scalability is a herculean task. In this context, the incorporation of a potential clustering algorithm has the possibility of improving the road safety and facilitating a reliable option of promoting message routing. The clustering protocols are determined to be the ideal candidate for solving the problems of network scalability to guarantee reliable data dissemination. In this paper, Remora optimization algorithm-based Optimized Node Clustering (ROAONC) Technique is proposed for node clustering in VANETs to achieved optimal CH selection process. This ROAONC scheme was proposed for minimizing network overhead in the scenarios of unpredictable node density. The simulation results of this ROAONC scheme confirmed better performance in terms of transmission range, node density, network area and number of clusters compared to the competitive ant colony, grey wolf, grasshopper, and dragonfly optimization algorithm-based clustering protocols.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 74-79"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000082/pdfft?md5=1c34e7af1d5a3879e53b71b071d8e46a&pid=1-s2.0-S2666603022000082-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77721851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development and performance evaluation of Correntropy Kalman Filter for improved accuracy of GPS position estimation 提高GPS位置估计精度的相关卡尔曼滤波器的研制与性能评价
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.01.002
Sirish Kumar Pagoti , Srilatha Indira Dutt Vemuri
{"title":"Development and performance evaluation of Correntropy Kalman Filter for improved accuracy of GPS position estimation","authors":"Sirish Kumar Pagoti ,&nbsp;Srilatha Indira Dutt Vemuri","doi":"10.1016/j.ijin.2022.01.002","DOIUrl":"10.1016/j.ijin.2022.01.002","url":null,"abstract":"<div><p>It is well known that a Global Positioning System (GPS) receiver needs to ‘see’ at least four satellites to provide a three-dimensional fix solution. However, if any GPS receiver is operated in urban canyons, the visibility further reduces. To improve the position estimation accuracy, a novel kinematic positioning algorithm designated as Correntropy Kalman Filter (CKF) is proposed in this study. Instead of minimum mean square error (MMSE), the correntropy criterion (CC) is used as the optimality criterion of CKF. Like the traditional Kalman Filter (KF), the prior estimate of the state and covariance matrix are computed in CKF, and a novel fixed-point algorithm is then used to update the posterior estimates. The data of a dual-frequency GPS receiver located at the Indian Institute of Science (IISc), Bangalore (13.021°N/77.5°E) is collected from Scripps Orbit and Permanent Array Centre (SOPAC) to implement the proposed algorithm. The results of the proposed CKF algorithm are promising and exhibit significant improvement in position estimation compared to the conventional methods.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 1-8"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000021/pdfft?md5=51aea651ebdade2d4c3fd01491e80616&pid=1-s2.0-S2666603022000021-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75487717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process 改进了基于Nahrain混沌映射的图像加密模型,实现了有效的图像加密过程
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.08.002
Fazly Salleh Abas , R Arulmurugan
{"title":"Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process","authors":"Fazly Salleh Abas ,&nbsp;R Arulmurugan","doi":"10.1016/j.ijin.2022.08.002","DOIUrl":"10.1016/j.ijin.2022.08.002","url":null,"abstract":"<div><p>As the intrinsic features of images include huge size and additional correlation prevailing among pixels, it is tedious to accomplish by using outdated models. The cryptographic features of Chaotic Maps (CM), including early criteria and random nature, aid in designing novel Image Encryption (IE) methods. In this paper, Nahrain Map with Radix Trie-based Image Encryption (NMRTIE) model is proposed to guarantee image encryption that resists known attacks that could be launched during its transmission in the cloud environment. The propounded NMRTIE model includes three essential phases: NCM-based Image Encryption (IE), Radix Trie (RT) based scrambling, and incessant diffusion. Initially, the NCM model uses more than one chaotic function to produce a sequence of keys. The RT model eases scrambling, where the rows and columns' pixels are swapped substantially. Lastly, the propounded diffusion scheme cooperates with NCM to produce key streams for remarkably hastening diffusion and dispersing effect. The propounded NMRTIE model is evaluated, and the results are confirmed based on numerous characteristics. The investigational consequence confirms that the propounded NMRTIE scheme is more appropriate than the associated approaches.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 102-108"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000100/pdfft?md5=a6ab2c96f5980eb523a11448d7bb76b4&pid=1-s2.0-S2666603022000100-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75100302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security behavior analysis in web of things smart environments using deep belief networks 基于深度信念网络的物联网智能环境安全行为分析
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.10.003
M. Premkumar , S.R. Ashokkumar , G. Mohanbabu , V. Jeevanantham , S. Jayakumar
{"title":"Security behavior analysis in web of things smart environments using deep belief networks","authors":"M. Premkumar ,&nbsp;S.R. Ashokkumar ,&nbsp;G. Mohanbabu ,&nbsp;V. Jeevanantham ,&nbsp;S. Jayakumar","doi":"10.1016/j.ijin.2022.10.003","DOIUrl":"10.1016/j.ijin.2022.10.003","url":null,"abstract":"<div><p>The advancements in modern wireless communications enhances the Internet of Things (IoT) which in turns the extensive variety of applications which covers smart home, healthcare, smart energy, and Industrial 4.0. The idea of the Web of Things (WoT) was established to expand the potential of these smart devices. It enables the devices that are connected through a common network. It has played a significant part in connecting all smart devices over the internet, allowing them to share services and resources globally. However, as devices become more connected, they become more exposed to various forms of malicious activities. The DDoS and DoS attacks are the major one that can disrupt the regular operation of network and expose the malicious information. So detecting and preventing the attacks in the WoT is a significant research area. The deep belief networks based intrusion detection system is proposed in this paper to detect the malicious activities like Normal, Botnet, Brute Force, Dos/DDos, Infiltration, PortScan and Web based attacks in WoTs. We examined the proposed method with the CICIDS2017 dataset for training and testing purposes and also achieved the average of 97.8% of accuracy and 97.6% of detection rate.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 181-187"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000203/pdfft?md5=729ad5f88bc4ff6261dceb331c08e6a0&pid=1-s2.0-S2666603022000203-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79314895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Machine-type communications in NOMA-based terahertz wireless networks 基于noma的太赫兹无线网络中的机器类型通信
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.04.002
Saifur Rahman Sabuj , Maisha Rubaiat , Mehzabien Iqbal , Monica Mobashera , Afrida Malik , Imtiaz Ahmed , Mohammad Abdul Matin
{"title":"Machine-type communications in NOMA-based terahertz wireless networks","authors":"Saifur Rahman Sabuj ,&nbsp;Maisha Rubaiat ,&nbsp;Mehzabien Iqbal ,&nbsp;Monica Mobashera ,&nbsp;Afrida Malik ,&nbsp;Imtiaz Ahmed ,&nbsp;Mohammad Abdul Matin","doi":"10.1016/j.ijin.2022.04.002","DOIUrl":"10.1016/j.ijin.2022.04.002","url":null,"abstract":"<div><p>Terahertz (THz) band is one of the most promising aspects of wireless communication systems because of its potential to meet the growing demands for the envisioned next-generation of cellular communications. THz band connectivity can alleviate bandwidth shortages and transmit power constraints using multiple-input multiple-output (MIMO) systems. To obtain better throughput and enhanced spectral efficiency, non-orthogonal multiple access (NOMA) configuration can be incorporated into MIMO systems, as NOMA uses non-orthogonal resource allocation by assigning the same carrier frequency to multiple devices in the power domain. In this paper, we focus on 2 × 1 MIMO-NOMA and cooperative 2 × 1 MIMO-NOMA systems for THz spectrum in the downlink transmission. In order to evaluate the effectiveness of the proposed system architecture, we derive accurate data rate, transmission latency, and reliability expressions for 2 × 1 MIMO-NOMA system consists of critical and non-critical devices by leveraging finite block length theory. Moreover, we derive the closed-form expressions for power splitting coefficients, data rate, transmission latency, and reliability for the considered cooperative 2 × 1 MIMO-NOMA system. Extensive numerical results are presented to validate the feasibility of the proposed 2 × 1 MIMO-NOMA as well as the cooperative 2 × 1 MIMO-NOMA systems in the THz band.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 31-47"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000045/pdfft?md5=ec5bae3460f4ee4ff6560e93d34c5dc8&pid=1-s2.0-S2666603022000045-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82178354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Significance of machine learning in healthcare: Features, pillars and applications 机器学习在医疗保健中的意义:特征、支柱和应用
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.05.002
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman , Shanay Rab
{"title":"Significance of machine learning in healthcare: Features, pillars and applications","authors":"Mohd Javaid ,&nbsp;Abid Haleem ,&nbsp;Ravi Pratap Singh ,&nbsp;Rajiv Suman ,&nbsp;Shanay Rab","doi":"10.1016/j.ijin.2022.05.002","DOIUrl":"10.1016/j.ijin.2022.05.002","url":null,"abstract":"<div><p>Machine Learning (ML) applications are making a considerable impact on healthcare. ML is a subtype of Artificial Intelligence (AI) technology that aims to improve the speed and accuracy of physicians' work. Countries are currently dealing with an overburdened healthcare system with a shortage of skilled physicians, where AI provides a big hope. The healthcare data can be used gainfully to identify the optimal trial sample, collect more data points, assess ongoing data from trial participants, and eliminate data-based errors. ML-based techniques assist in detecting early indicators of an epidemic or pandemic. This algorithm examines satellite data, news and social media reports, and even video sources to determine whether the sickness will become out of control. Using ML for healthcare can open up a world of possibilities in this field. It frees up healthcare providers' time to focus on patient care rather than searching or entering information. This paper studies ML and its need in healthcare, and then it discusses the associated features and appropriate pillars of ML for healthcare structure. Finally, it identified and discussed the significant applications of ML for healthcare. The applications of this technology in healthcare operations can be tremendously advantageous to the organisation. ML-based tools are used to provide various treatment alternatives and individualised treatments and improve the overall efficiency of hospitals and healthcare systems while lowering the cost of care. Shortly, ML will impact both physicians and hospitals. It will be crucial in developing clinical decision support, illness detection, and personalised treatment approaches to provide the best potential outcomes.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 58-73"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000069/pdfft?md5=2259f97c985b93b68b9b7921ffedeba9&pid=1-s2.0-S2666603022000069-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83431241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Design and implementation of a Social Distance Vest for Covid19 prevention (SODIV-COP) covid - 19预防社交距离背心(SODIV-COP)的设计与实现
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.08.003
Henry Eric Kapalamula, Justice Stanley Mlatho, Paul Stone Macheso
{"title":"Design and implementation of a Social Distance Vest for Covid19 prevention (SODIV-COP)","authors":"Henry Eric Kapalamula,&nbsp;Justice Stanley Mlatho,&nbsp;Paul Stone Macheso","doi":"10.1016/j.ijin.2022.08.003","DOIUrl":"10.1016/j.ijin.2022.08.003","url":null,"abstract":"<div><p>According to research, it is discovered that amongst the Covid19 preventive measures, social distance is easily neglected especially in a public setting such as markets, trading centers, social and political gatherings. Furthermore, according to World Health Organization (WHO), not observing social distance is one the major ways that the corona virus is being transmitted. Hence, working on a vest that can help to remind individuals and alert them in cases where they are not observing social distance. The Social Distance Vest for Covid19 Prevention, is based on Arduino Uno microcontroller board, D6T-44L-06 thermal sensor which detects the presence of a person, HC-SR04 Ultrasonic sensor that calculates the distance from where the person is standing and an alert/warning system that is composed of a Light Emitting Diode and a buzzer. Finally, the whole system is mounted on a reflective vest. The prototype vest works perfectly, in that it is able to detect a person which was not possible in the previous covid 19 distance vests which had only messages, and it is able to calculate the distance from where humans are standing and finally, triggers an alarm in a case where the person is standing at a distance of less than 1 m. The varying temperature ranges were in an array form and from 35 to 38° Celsius it detected the obstacle to be a human and had some ranges of distance 0.334 m measured by the ultrasonic sensor. Key applications of the prototypes are in crowded places like stadiums hospitals and schools.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 113-118"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000112/pdfft?md5=7019b8e6ab6f3e3ee2b600b892d72157&pid=1-s2.0-S2666603022000112-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80030328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved constrained social network rating-based neural network technique for recommending products in E-commerce environment 基于约束社会网络评级的改进电子商务环境下产品推荐神经网络技术
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.07.001
Lohith Ottikunta
{"title":"Improved constrained social network rating-based neural network technique for recommending products in E-commerce environment","authors":"Lohith Ottikunta","doi":"10.1016/j.ijin.2022.07.001","DOIUrl":"10.1016/j.ijin.2022.07.001","url":null,"abstract":"<div><p>In the modern world, the essentiality in the utilization of the e-commerce contents like movies, music and electronic goods becomes indispensable with diversified items searched over the internet. The relevant results of the items search are made feasible through the enforcement of filtering techniques since it determines relevant data for recommendation of an item. A diversified number of filtering schemes are available of filtering the data instead of accessing each data available on the internet for deriving associated results. The data access and efficiency, the process of identifying relevant results based on users’ preferences is challenging task. In this paper, the proposed Constrained Social Network Rating-based Neural Network Technique (CSNR-NNT) is presented with the key significances and implementation processes. This proposed CSNR-NNT significantly concentrates on the exploration of trustee information that aids in social content persuading selection process for facilitating superior recommendation. The proposed CSNR-NNT scheme utilized the benefits of neural learning for ensuring recommendation through the incorporation of distrust and trustee relation. This proposed CSNR-NNT scheme also aids in categorizing the positive and negative recommendation of the trustee based on the process of the prediction.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 80-86"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000070/pdfft?md5=87ad3ea9e9bff958fd0a38bc82a5cf98&pid=1-s2.0-S2666603022000070-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73240523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信