Due to the Covid-19 pandemic, the education system in India has changed to remote that is, online study mode. Though there are works on the effect of teaching learning on Indian students, the effect of online mode and...
详细信息
Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. Lic...
详细信息
In an Internet of Things (IoT) assisted Wireless Sensor Network (WSN), the location of the Base Station (BS) remains important. BS serves as the central hub for data collection, aggregation and communication within th...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
We consider the online convex optimization (OCO) problem with quadratic and linear switching cost when at time t only gradient information for functions fτ, τ 16(Lµ+5) for the quadratic switching cost, and also...
详细信息
We consider the online convex optimization (OCO) problem with quadratic and linear switching cost when at time t only gradient information for functions fτ, τ 16(Lµ+5) for the quadratic switching cost, and also show the bound to be order-wise tight in terms of L, µ. In addition, we show that the competitive ratio of any online algorithm is at least max{Ω(L), Ω(pLµ )} when the switching cost is quadratic. For the linear switching cost, the competitive ratio of the OMGD algorithm is shown to depend on both the path length and the squared path length of the problem instance, in addition to L, µ, and is shown to be order-wise, the best competitive ratio any online algorithm can achieve. Copyright is held by author/owner(s).
The use of metamaterial enhances the performance of a specific class of antennas known as metamaterial *** radiation cost and quality factor of the antenna are influenced by the size of the *** antennas allow for the ...
详细信息
The use of metamaterial enhances the performance of a specific class of antennas known as metamaterial *** radiation cost and quality factor of the antenna are influenced by the size of the *** antennas allow for the circumvention of the bandwidth restriction for small *** parameters have recently been predicted using machine learning algorithms in existing *** learning can take the place of the manual process of experimenting to find the ideal simulated antenna *** accuracy of the prediction will be primarily dependent on the model that is *** this paper,a novel method for forecasting the bandwidth of the metamaterial antenna is proposed,based on using the Pearson Kernel as a standard *** with these new approaches,this paper suggests a unique hypersphere-based normalization to normalize the values of the dataset attributes and a dimensionality reduction method based on the Pearson kernel to reduce the dimension.A novel algorithm for optimizing the parameters of Convolutional Neural Network(CNN)based on improved Bat Algorithm-based Optimization with Pearson Mutation(BAO-PM)is also presented in this *** prediction results of the proposed work are better when compared to the existing models in the literature.
Insider threats, in which someone within an organization poses a risk, are widely regarded as the most dangerous in cybersecurity. Many analysts are working hard to identify and prevent these risks. However, the most ...
详细信息
Adaptive multicolor filters have emerged as key components for ensuring color accuracy and resolution in outdoor visual ***,the current state of this technology is still in its infancy and largely reliant on liquid cr...
详细信息
Adaptive multicolor filters have emerged as key components for ensuring color accuracy and resolution in outdoor visual ***,the current state of this technology is still in its infancy and largely reliant on liquid crystal devices that require high voltage and bulky structural ***,we present a multicolor nanofilter consisting of multilayered‘active’plasmonic nanocomposites,wherein metallic nanoparticles are embedded within a conductive polymer *** nanocomposites are fabricated with a total thickness below 100 nm using a‘lithography-free’method at the wafer level,and they inherently exhibit three prominent optical modes,accompanying scattering phenomena that produce distinct dichroic reflection and transmission ***,a pivotal achievement is that all these colors are electrically manipulated with an applied external voltage of less than 1 V with 3.5 s of switching speed,encompassing the entire visible ***,this electrically programmable multicolor function enables the effective and dynamic modulation of the color temperature of white light across the warm-to-cool spectrum(3250 K-6250 K).This transformative capability is exceptionally valuable for enhancing the performance of outdoor optical devices that are independent of factors such as the sun’s elevation and prevailing weather conditions.
Due of Twitter's widespread appeal as a platform for sharing activities, entertainment, and information, spammers have taken notice and are using it to propagate false information and harass clients. Researchers a...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and sewage treatment facilities,oil and gas pipelines,*** recent times,these systems have suffered from cyber attacks numer-ous *** have been developing cyber security solutions for Cls to avoid lasting *** to standard frameworks,cyber security based on identification,protection,detection,response,and recovery are at the core of these *** of an ongoing attack that escapes standard protection such as firewall,anti-virus,and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the ***,anomaly detection in physical dynamics proves an effective means to implement *** is one example of anomaly detection in the sensor/actuator data,representing such systems physical *** present EPASAD,which improves the detection technique used in PASAD to detect these micro-stealthy attacks,as our experiments show that PASAD's spherical boundary-based detection fails to *** method EPASAD overcomes this by using Ellipsoid boundaries,thereby tightening the boundaries in various dimen-sions,whereas a spherical boundary treats all dimensions *** validate EPASAD using the dataset produced by the TE-process simulator and the C-town *** results show that EPASAD improves PASAD's average recall by 5.8%and 9.5%for the two datasets,respectively.
暂无评论