In large-scale distributed systems, the performance of computation tasks is often significantly degraded by straggling nodes. Recently, coded computation has emerged as a promising approach to mitigate the effect of s...
详细信息
This paper introduces a dynamic-frame time division multiple access (DF-TDMA) scheme aimed at decreasing the age of collection (AoC) in collaborative monitoring scenarios. Unlike the conventional age of information (A...
详细信息
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely hi...
详细信息
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely high,so we introduce a hybrid filter-wrapper feature selection algorithm based on an improved equilibrium optimizer for constructing an emotion recognition *** proposed algorithm implements multi-objective emotion recognition with the minimum number of selected features and maximum ***,we use the information gain and Fisher Score to sort the features extracted from ***,we employ a multi-objective ranking method to evaluate these features and assign different importance to *** with high rankings have a large probability of being ***,we propose a repair strategy to address the problem of duplicate solutions in multi-objective feature selection,which can improve the diversity of solutions and avoid falling into local *** random forest and K-nearest neighbor classifiers,four English speech emotion datasets are employed to test the proposed algorithm(MBEO)as well as other multi-objective emotion identification *** results illustrate that it performs well in inverted generational distance,hypervolume,Pareto solutions,and execution time,and MBEO is appropriate for high-dimensional English SER.
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
The application of noninvasive methods to enhance healthcare systems has been facilitated by the development of new technology. Among the four major cardiovascular diseases, stroke is one of the deadliest and potentia...
详细信息
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies...
详细信息
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies for classification/detection of fake news are content-based,network(propagation)based,or multimodal methods that combine both textual and visual *** introduce here a framework,called FNACSPM,based on sequential pattern mining(SPM),for fake news analysis and *** this framework,six publicly available datasets,containing a diverse range of fake and real news,and their combination,are first transformed into a proper ***,algorithms for SPM are applied to the transformed datasets to extract frequent patterns(and rules)of words,phrases,or linguistic *** obtained patterns capture distinctive characteristics associated with fake or real news content,providing valuable insights into the underlying structures and commonalities of ***,the discovered frequent patterns are used as features for fake news *** framework is evaluated with eight classifiers,and their performance is assessed with various *** experiments were performed and obtained results show that FNACSPM outperformed other state-of-the-art approaches for fake news classification,and that it expedites the classification task with high accuracy.
Ocean data collection via unmanned aerial vehicles (UAVs) has received widespread attention due to its flexibility and low cost. To further improve the efficiency of large maritime data collection between the UAVs and...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
With the continuous advancement of the smart home market, household items have become more intelligent. By identifying the different material attributes of various household tabletops, we can obtain contextual informa...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meet...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meeting the Service Level Agreement(SLA).To consolidate the workloads,the hosts are segregated into three categories:normal hosts,under-loaded hosts,and over-loaded hosts based on their *** is to be noted that the identification of an extensively used host or underloaded host is challenging to ***-old values were proposed in the literature to detect this *** current study aims to improve the existing methods that choose the underloaded hosts,get rid of Virtual Machines(VMs)from them,andfinally place them in some other *** researcher proposes a Host Resource Utilization Aware(HRUAA)Algorithm to detect those underloaded and place its virtual machines on different hosts in a vibrant Cloud *** mechanism presented in this study is contrasted with existing mechanisms *** results attained from the study estab-lish that numerous hosts can be shut down,while at the same time,the user's workload requirement can also be *** proposed method is energy-efficient in workload consolidation,saves cost and time,and leverages active hosts.
暂无评论