In the era of 6G, cellular networks will no longer be locked into a small set of equipment manufacturers;instead, cellular networks will be disaggregated and support open interfaces. Thus, there is an inherent need fo...
详细信息
The growth of the internet and technology has had a significant effect on social *** information has become an important research topic due to the massive amount of misinformed content on social *** is very easy for a...
详细信息
The growth of the internet and technology has had a significant effect on social *** information has become an important research topic due to the massive amount of misinformed content on social *** is very easy for any user to spread misinformation through the ***,misinformation is a problem for professionals,organizers,and ***,it is essential to observe the credibility and validity of the News articles being shared on social *** core challenge is to distinguish the difference between accurate and false *** studies focus on News article content,such as News titles and descriptions,which has limited their ***,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user *** the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and *** calculate user credibility and combine it with article content with the user’s *** combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or ***,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required *** dataset contains 23000+articles with millions of user *** highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest *** discoveries confirmed that the proposed classifier would effectively classify misinformat
In recent years, underwater robots have been an essential focus of marine science and technology applications. Whether it is the application of military tasks or general civil affairs, underwater robots have played a ...
详细信息
This article introduces a non-invasive pressure therapy method using monaural beats (MB) sonic resonance to promote relaxation and reduce stress. Unlike binaural beats (BB), MB requires no headphones, enhancing access...
详细信息
The sharing of encrypted data in cloud computing is an essential functionality with countless applications in our everyday life. However, the issue of how to securely, efficiently and flexibly share encrypted data in ...
详细信息
Handwritten character segmentation plays a pivotal role in the performance of Optical Character Recognition (OCR) systems. This paper introduces an innovative approach to enhancing segmentation accuracy using Region-B...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of...
详细信息
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of distinguishing between truthful and deceptive *** news,a prevalent issue,particularly on social media,complicates the assessment of news *** pervasive spread of fake news not only misleads the public but also erodes trust in legitimate news sources,creating confusion and polarizing *** the volume of information grows,individuals increasingly struggle to discern credible content from false narratives,leading to widespread misinformation and potentially harmful *** numerous methodologies proposed for fake news detection,including knowledge-based,language-based,and machine-learning approaches,their efficacy often diminishes when confronted with high-dimensional datasets and data riddled with noise or *** study addresses this challenge by evaluating the synergistic benefits of combining feature extraction and feature selection techniques in fake news *** employ multiple feature extraction methods,including Count Vectorizer,Bag of Words,Global Vectors for Word Representation(GloVe),Word to Vector(Word2Vec),and Term Frequency-Inverse Document Frequency(TF-IDF),alongside feature selection techniques such as information Gain,Chi-Square,Principal Component Analysis(PCA),and Document *** comprehensive approach enhances the model’s ability to identify and analyze relevant features,leading to more accurate and effective fake news *** findings highlight the importance of a multi-faceted approach,offering a significant improvement in model accuracy and ***,the study emphasizes the adaptability of the proposed ensemble model across diverse datasets,reinforcing its potential for broader application in real-world *** introduce a pioneering ensemble
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for ...
详细信息
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for the authentication of data between the data user and the data owner. However, blockchain networks are vulnerable to potential privacy risks and security issues concerned with the data transfer and the logging of data transactions. To overcome these challenges and enhance the security associated with blockchain storage systems, this research develops a highly authenticated secure blockchain storage system utilizing a rider search optimized deep Convolution Neural Network(CNN) model. The architecture integrates the Ethereum blockchain, Interplanetary File System (IPFS), data users, and owners, in which the Smart contracts eliminate intermediaries, bolstering user-owner interactions. In tandem, blockchain ensures immutable transaction records, and merging IPFS with blockchain enables off-chain, distributed storage of data, with hash records on the blockchain. The research accomplishes privacy preservation through six-phase network development: system establishment, registration, encryption, token generation, testing, and decryption. Parameters for secure transactions are initialized, user registration provides genuine user transaction credentials, and encryption guarantees data security, employing optimized Elliptic Curve Cryptography (ECC). Further, the optimized ECC algorithm is developed utilizing a novel rider search optimization that utilizes search and rescue characteristics of human, and rider characteristics for determining the shorter key lengths. Token generation involves issuing digital tokens on a blockchain platform, followed by testing using a deep CNN classifier to detect anomalies and prevent unauthorized data access during the test phase. The decryption of data is conducted for registered users. The developed rider search optimized deep CN
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseas...
详细信息
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseases can have severe consequences and spread,especially among *** detection is crucial to prevent their spread and improve a patient’s chances of ***,the branch of medicine dealing with skin diseases,faces challenges in accurately diagnosing these conditions due to the difficulty in identifying and distinguishing between different diseases based on their appearance,type of skin,and *** study presents a method for detecting skin diseases using Deep Learning(DL),focusing on the most common diseases affecting children in Saudi Arabia due to the high UV value in most of the year,especially in the *** method utilizes various Convolutional Neural Network(CNN)architectures to classify skin conditions such as eczema,psoriasis,and *** proposed method demonstrates high accuracy rates of 99.99%and 97%using famous and effective transfer learning models MobileNet and DenseNet121,*** illustrates the potential of DL in automating the detection of skin diseases and offers a promising approach for early diagnosis and treatment.
暂无评论