This study tackles the problem of missing data in migrant datasets by introducing a new framework that combines machine learning techniques with neutrosophic sets. These sets, which can represent uncertainty and ambig...
详细信息
Approval-Based Committee (ABC) rules are an important tool for choosing a fair set of candidates when given the preferences of a collection of voters. Though finding a winning committee for many ABC rules is NP-hard, ...
详细信息
Covert channels for the transmission of stegano-graphic messages are not only possible in classic internet protocols but also in wireless communications such as 4G and 5G air interface. Hiding patterns collect the cen...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
Covert channels for the transmission of stegano-graphic messages are not only possible in classic internet protocols but also in wireless communications such as 4G and 5G air interface. Hiding patterns collect the central ideas behind these channels. We therefore derive rules for protocol design, conformance to which disables at least the most frequently used covert channel approaches. Starting from 5G, we investigate where 6G standardization might take such rules into account to better protect 6G protocols against covert channels from the beginning,
Analyzing their mistakes affords students opportunities for improved learning and success in problem solving disciplines, especially when students are able to identify reasons for their errors and modify their future ...
详细信息
For a graph G, let alpha(G) denote the size of the largest independent set in G, and let theta(G) denote the Lovasz theta-function on G. We prove that for some c > 0, there exists an infinite family of graphs such ...
详细信息
For a graph G, let alpha(G) denote the size of the largest independent set in G, and let theta(G) denote the Lovasz theta-function on G. We prove that for some c > 0, there exists an infinite family of graphs such that theta(G) > alpha(G)n/2(c root log n), where n denotes the number of vertices in a graph. This disproves a known conjecture regarding the theta function. As part of our proof, we analyse the behavior of the chromatic number in graphs under a randomized version of graph products. This analysis extends earlier work of Linial and Vazirani, and of Berman and Schnitger, and may be of independent interest.
In branching process theory, linear-fractional distributions are commonly used to model individual reproduction, especially when the goal is to obtain more explicit formulas than those derived under general model assu...
详细信息
Offensive language detection is essential for maintaining respectful and inclusive online environments. By implementing detection systems, platforms aim to protect users from harmful content, curb the spread of hate s...
详细信息
ISBN:
(数字)9798331508913
ISBN:
(纸本)9798331508920
Offensive language detection is essential for maintaining respectful and inclusive online environments. By implementing detection systems, platforms aim to protect users from harmful content, curb the spread of hate speech, and promote positive interactions within digital communities. Leveraging natural language processing (NLP) techniques, this area has become a key focus in computational linguistics research and development. To address this challenge, we created the ParsOffensive dataset, consisting of approximately 8,433 Persian comments labeled as Offensive or Neutral. These comments were sourced from Instagram and labeled by two linguists. Machine learning models were trained on this dataset, with the ParsBert model achieving 90% accuracy in detecting offensive speech in Persian.
We present beam measurements of the CHIME telescope using a radio calibration source deployed on a drone payload. During test flights, the pulsing calibration source and the telescope were synchronized to GPS time, en...
详细信息
Among cognitive radio networks there is a persistent trend of competition to acquire under-utilized and idle channels for data transmission. The competition for spectrum resources often results in the misuse of the sp...
详细信息
Among cognitive radio networks there is a persistent trend of competition to acquire under-utilized and idle channels for data transmission. The competition for spectrum resources often results in the misuse of the spectrum resources as networks experience contention in attempt to access unoccupied spectrum bands. The competitive scenario causes cognitive radio networks to incur a huge amount of loss, which constitutes a major problem of self-coexistence among networks. As a way to minimize these losses we present a self-coexistence mechanism that allows cognitive radio networks to coexist with each other by implementing a risk-motivated channel selection based on deference structure. Cognitive radio networks form deference structure community to have more efficient access to a channel of interest and can defer transmission to one another on that channel, thereby minimizing the chances of conflicts. As part of the decision making process to become a member of a deference structure community, cognitive radio networks rely on a risk-motivated channel selection scheme to evaluate the tentative deference structure channel. We provide numerical and simulation results that demonstrates the benefits of the proposed self-coexistence mechanism and show how it helps networks to coordinate their spectrum activities, minimize contention experienced and improve their utility. We also emphasize on the importance of the deference structure community size with regards to the average performance of member networks.
暂无评论