Internet of Things (IoT) devices are small, low-power devices used for detecting and processing data remotely through the internet. These devices have increasingly been integrated into our daily lives, both in the dig...
详细信息
To fortify security mechanisms in software systems for the Internet of Things (IoT), this article presents a framework for AI-Enhanced Virtual Twin Modelling. In order to track and examine the actions of IoT devices i...
详细信息
To build an intelligent intrusion detection system, it is essential to have a suitable and high-quality dataset with a sufficiently large quantity to simulate real-world scenarios. The NSL-KDD dataset is an improved v...
详细信息
Text Summarization might seem like a trivial problem, but in reality, is essential for data acquisition and understanding by compressing large amounts of text into specific a nd to-the-point summaries. This research i...
详细信息
Anomaly and failure detection methods are crucial in identifying deviations from normal system operational conditions, which allows for actions to be taken in advance, usually preventing more serious damages. Long-las...
详细信息
In today's world, cyber-attacks are on the rise, and PDF files are commonly used as a means of attack. One common type of attack through PDF files is the covert embedding of dangerous malware and tricking users in...
详细信息
This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding,called *** p...
详细信息
This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding,called *** proposed method introduces a better search space to find the optimal solution at each ***,we proposed RSA-SSA to avoid the searching problem in the same area and determine the optimal multi-level *** obtained solutions by the proposed method are represented using the image *** proposed RSA-SSA employed Otsu’s variance class function to get the best threshold values at each *** performance measure for the proposed method is valid by detecting fitness function,structural similarity index,peak signal-to-noise ratio,and Friedman ranking *** benchmark images of COVID-19 validate the performance of the proposed *** results showed that the proposed RSA-SSA outperformed other metaheuristics optimization algorithms published in the literature.
This Software engineering (SE) is the core research area of the software industry, and numerous algorithms and frameworks are proposed every day. Software Engineering is the discipline that keeps up with recent develo...
详细信息
Due to the exponential growth of video data,aided by rapid advancements in multimedia *** became difficult for the user to obtain information from a large video *** process of providing an abstract of the entire video...
详细信息
Due to the exponential growth of video data,aided by rapid advancements in multimedia *** became difficult for the user to obtain information from a large video *** process of providing an abstract of the entire video that includes the most representative frames is known as static video *** method resulted in rapid exploration,indexing,and retrieval of massive video *** propose a framework for static video summary based on a Binary Robust Invariant Scalable Keypoint(BRISK)and bisecting K-means clustering *** current method effectively recognizes relevant frames using BRISK by extracting keypoints and the descriptors from video *** video frames’BRISK features are clustered using a bisecting K-means,and the keyframe is determined by selecting the frame that is most near the cluster *** applying any clustering parameters,the appropriate clusters number is determined using the silhouette *** were carried out on a publicly available open video project(OVP)dataset that contained videos of different *** proposed method’s effectiveness is compared to existing methods using a variety of evaluation metrics,and the proposed method achieves a trade-off between computational cost and quality.
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geomet...
详细信息
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geometric structure of the compound relates to a few physical properties such as boiling point,enthalpy,π-electron energy,andmolecular *** article aims to determine the practical application of graph theory by solving one of the interdisciplinary problems describing the structures of benzenoid hydrocarbons and *** topological index is an invariant of a molecular graph associated with the chemical structure,which shows the correlation of chemical structures using many physical,chemical properties and biological *** study aims to introduce some novel degree-based entropy descriptors such as ENTSO,ENTGH,ENTHG,ENTSS,ENTNSO,ENTNReZ1,ENTNReZ2 and ENTNSS using the respective topological ***,the above-mentioned entropy measures and physico-chemical properties of benzenoid hydrocarbons are fitted using linear regression models and calculated for graphenylene structure.
暂无评论