Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information implicit in AEFS changes. In this paper, a Fuzzy C-Means(FCM) clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by AEFS. First, a time series dataset is created in the time domain using AEFS attributes. The AEFS-based weather is evaluated according to the time-series Membership Degree(MD) changes obtained by inputting this dataset into the FCM. Second, thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF apparatus. Thus, a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space domain. Finally, the rationality and reliability of the proposed method are verified by combining radar charts and expert experience. The results confirm that this method accurately characterizes the weather attributes and changes in the AEFS, and a negative distance-MD correlation is obtained for the first time. The detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut...
详细信息
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve...
详细信息
Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network...
详细信息
One of the finalists for the eSTREAM projects in 2005 was Salsa, created by Daniel J. Bernstein. Salsa is a widely recognised stream cipher that gained prominence after multiple cryptanalytic techniques were applied t...
详细信息
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy...
详细信息
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti...
详细信息
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detection efficiency. Additionally, this technology provides developers with a means to quickly identify errors, thereby improving software robustness and overall quality. However, current research in software defect prediction often faces challenges, such as relying on a single data source or failing to adequately account for the characteristics of multiple coexisting data sources. This approach may overlook the differences and potential value of various data sources, affecting the accuracy and generalization performance of prediction results. To address this issue, this study proposes a multivariate heterogeneous hybrid deep learning algorithm for defect prediction (DP-MHHDL). Initially, Abstract Syntax Tree (AST), Code Dependency Network (CDN), and code static quality metrics are extracted from source code files and used as inputs to ensure data diversity. Subsequently, for the three types of heterogeneous data, the study employs a graph convolutional network optimization model based on adjacency and spatial topologies, a Convolutional Neural Network-Bidirectional Long Short-Term Memory (CNN-BiLSTM) hybrid neural network model, and a TabNet model to extract data features. These features are then concatenated and processed through a fully connected neural network for defect prediction. Finally, the proposed framework is evaluated using ten promise defect repository projects, and performance is assessed with three metrics: F1, Area under the curve (AUC), and Matthews correlation coefficient (MCC). The experimental results demonstrate that the proposed algorithm outperforms existing methods, offering a novel solution for software defect prediction.
Wireless sensor networks (WSN) have seen immense use in everyday life, like health, battle-field administration, and disaster administration. Nodes inside WSN are more vulnerable to safety attacks like data replay and...
详细信息
Wireless sensor networks (WSN) have seen immense use in everyday life, like health, battle-field administration, and disaster administration. Nodes inside WSN are more vulnerable to safety attacks like data replay and eavesdropping attacks. Node capture attacks function as destructive attacks that let attackers physically seize sensor nodes, reconfigure the structures, and deploy new nodes. An efficient architecture consists of a number of protocols for safe key creation and node capture attack revocation. A pairwise key establishment addresses arbitrary inputs from the pair of nodes implicated for the secure key establishment. Thus, the detailed exploration of various attack models to enhance key management security is a critical research direction in WSN security. Our model approaches the node capture attack problem from an attacker's viewpoint. The proposed model discovers the optimal collection of nodes likely to be attacked for node capturing. Based on the optimization algorithm i.e., fruit fly, the proposed model identifies multiple objectives like the set of dominating nodes, the vulnerability in paths, traveling cost, node contribution, and dominant rank and computes the optimal set of nodes with higher destructiveness. This indicates that the suggested node capture model has significant performance in the aspect of the least cost and lower attacking rounds. In this proposed model, we present an improved fruit fly optimization based attacking model consisting of several objectives as node strength, node and key participation rank, dominant rank and cost for capturing nodes in the system. Our approach outperforms existing attack models like RA, MLA, MTA, MKA, FGA, FFOA, and MA in terms of largest traffic compromised, lowest total attacking rounds, key captured, and least energy cost. The results demonstrated that the proposed method attained a path compromise probability up to 91% and reduced the cost by 60% in a network size of 100 nodes. The deduction in th
Automated analysis of breast cancer (BC) histopathology images is a challenging task due to the high resolution, multiple magnifications, color variations, the presence of image artifacts, and morphological variabilit...
详细信息
Wireless charging is widely used to charge smart devices with limited battery capacity. However, it is susceptible to the identity spoofing attack, where adversaries can impersonate malicious devices as legitimate one...
详细信息
暂无评论