A smart public transportation system with reliable services addresses urban challenges like traffic congestion, infrastructure maintenance, travel costs, and pollution. As part of smart city initiatives, urban public ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi...
详细信息
With the rapid development of artificial intelligence and the Internet of Things,along with the growing demand for privacy-preserving transmission,the need for efficient and secure communication systems has become inc...
详细信息
With the rapid development of artificial intelligence and the Internet of Things,along with the growing demand for privacy-preserving transmission,the need for efficient and secure communication systems has become increasingly *** communication methods transmit data at the bit level without considering its semantic significance,leading to redundant transmission overhead and reduced *** communication addresses this issue by extracting and transmitting only the mostmeaningful semantic information,thereby improving bandwidth ***,despite reducing the volume of data,it remains vulnerable to privacy risks,as semantic features may still expose sensitive *** address this,we propose an entropy-bottleneck-based privacy protection mechanism for semantic *** approach uses semantic segmentation to partition images into regions of interest(ROI)and regions of non-interest(RONI)based on the receiver’s needs,enabling differentiated semantic *** focusing transmission on ROIs,bandwidth usage is optimized,and non-essential data is *** entropy bottleneck model probabilistically encodes the semantic information into a compact bit stream,reducing correlation between the transmitted content and the original data,thus enhancing privacy *** proposed framework is systematically evaluated in terms of compression efficiency,semantic fidelity,and privacy *** comparative experiments with traditional and state-of-the-art methods,we demonstrate that the approach significantly reduces data transmission,maintains the quality of semantically important regions,and ensures robust privacy protection.
The rapid proliferation of Internet of Things (IoT) devices, coupled with the rollout of advanced 5G networks, has generated significant concerns regarding security breaches. These concerns stem from the expanded atta...
详细信息
The recent Internet of Things (IoT) adoption has revolutionized various applications while introducing significant security and privacy challenges. Traditional security solutions are unsuitable for IoT systems due to ...
详细信息
The work focuses on the utilization of the conventional solid-state sintering procedure to synthesize white phosphors Ca_(2)InTaO_(6):xDy^(3+)(0.02≤x≤0.12).Utilizing X-ray diffraction,the phase structure of samples ...
详细信息
The work focuses on the utilization of the conventional solid-state sintering procedure to synthesize white phosphors Ca_(2)InTaO_(6):xDy^(3+)(0.02≤x≤0.12).Utilizing X-ray diffraction,the phase structure of samples was examined,and the crystal structure was refined using the Rietveld method.A scanning electron microscope was used to analyze the microstructure of ***-principles calculations confirm that the indirect bandgap of Ca_(2)InTaO_(6)is 3.786 eV,The luminous properties and energy transfer mechanism of Ca_(2)InTaO_(6):xDy^(3+)were studied using photoluminescence ***^(4)F_(9/2)→^(6)H_(13/2)transition of Dy^(3+)ions is responsible for the greatest emission peak,which was measured at 575 *** to research,the lifespan falls as the concentration of Dy^(3+)doping amount rises because of frequent interaction and ene rgy transfer between Dy^(3+)*** correlated color temperature of the WLEDs packaged with Ca_(2)InTaO_(6):0.08Dy^(3+)is 4677 K and CIE 1931 chromaticity coordinates are(0.3578,0.3831).Meantime,the phosphor also shows outstanding te mperature stability property,which maintains 83.8%of its initial emission intensity at 450 K(activation energy of 0.1467 eV).The W-LEDs retain their performance for 100 min when powered at 3.4 V voltage and 600 mA current,demonstrating the packed W-LEDs'sustaine d operation at high temperatures.
Forest fires pose a serious threat to ecological balance, air quality, and the safety of both humans and wildlife. This paper presents an improved model based on You Only Look Once version 5 (YOLOv5), named YOLO Light...
详细信息
Forest fires pose a serious threat to ecological balance, air quality, and the safety of both humans and wildlife. This paper presents an improved model based on You Only Look Once version 5 (YOLOv5), named YOLO Lightweight Fire Detector (YOLO-LFD), to address the limitations of traditional sensor-based fire detection methods in terms of real-time performance and accuracy. The proposed model is designed to enhance inference speed while maintaining high detection accuracy on resource-constrained devices such as drones and embedded systems. Firstly, we introduce Depthwise Separable Convolutions (DSConv) to reduce the complexity of the feature extraction network. Secondly, we design and implement the Lightweight Faster Implementation of Cross Stage Partial (CSP) Bottleneck with 2 Convolutions (C2f-Light) and the CSP Structure with 3 Compact Inverted Blocks (C3CIB) modules to replace the traditional C3 modules. This optimization enhances deep feature extraction and semantic information processing, thereby significantly increasing inference speed. To enhance the detection capability for small fires, the model employs a Normalized Wasserstein Distance (NWD) loss function, which effectively reduces the missed detection rate and improves the accuracy of detecting small fire sources. Experimental results demonstrate that compared to the baseline YOLOv5s model, the YOLO-LFD model not only increases inference speed by 19.3% but also significantly improves the detection accuracy for small fire targets, with only a 1.6% reduction in overall mean average precision (mAP)@0.5. Through these innovative improvements to YOLOv5s, the YOLO-LFD model achieves a balance between speed and accuracy, making it particularly suitable for real-time detection tasks on mobile and embedded devices.
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all...
详细信息
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods.
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati...
详细信息
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)***-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting *** paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and *** results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.
暂无评论