This paper surveys some of the most important recent works related to micro-expression analysis. It includes discussions on algorithms for spotting and recognizing micro-expressions, their performances, databases, and...
详细信息
A fuzzy visual image denoising algorithm based on Bayesian estimation is proposed to address the problems of poor denoising performance and long denoising time in traditional image denoising algorithms. First, analyse...
详细信息
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ...
详细信息
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. In QSM, the traditional signal detection methods sometimes are unable to meet the actual requirement of low complexity of the system. Therefore, this paper proposes a signal detection scheme for QSM systems using deep learning to solve the complexity problem. Results from the simulations show that the bit error rate performance of the proposed deep learning-based detector is better than that of the zero-forcing(ZF) and minimum mean square error(MMSE) detectors, and similar to the maximum likelihood(ML) detector. Moreover, the proposed method requires less processing time than ZF, MMSE,and ML.
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, prov...
详细信息
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, providing more flexible services, and reducing network capital and operational costs. However, it also poses new challenges that need to be addressed. A challenging problem with NFV is resource management, since the resources required by each virtualized network function (VNF) change with dynamic traffic variations, requiring automatic scaling of VNF resources. Due to the resource consumption importance, it is essential to propose an efficient resource auto-scaling method in the NFV networks. Inadequate or excessive utilization of VNF resources can result in diminished performance of the entire service chain, thereby affecting network performance. Therefore, predicting VNF resource requirements is crucial for meeting traffic demands. VNF behavior in networks is complex and nonlinear, making it challenging to model. By incorporating machine learning methods into resource prediction models, network service performance can be improved by addressing this complexity. As a result, this paper introduces a new auto-scaling architecture and algorithm to tackle the predictive VNF problem. Within the proposed architecture, there is a predictive VNF auto-scaling engine that comprises two modules: a predictive task scheduler and a predictive VNF auto-scaler. Furthermore, a prediction engine with a VNF resource predictor module has been designed. In addition, the proposed algorithm called GPAS is presented in three phases, VNF resource prediction using genetic programming (GP) technique, task scheduling and decision-making, and auto-scaling execution. The GPAS method is simulated in the KSN framework, a network environment based on NFV/SDN. In the evaluation results, the GPAS method shows better performance in SLA violation rate, resource usage, and response time when co
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** u...
详细信息
The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content *** user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social ***,a combination of multiple behaviors in profiling users has yet to be *** research takes a novel approach and explores user intent types based on multidimensional online behavior in information *** research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine *** research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data *** feedback is based on online behavior and practices collected by using a survey *** participants include both males and females from different occupation sectors and different *** data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their *** techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of *** average is computed to identify user intent type *** user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on th
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key...
详细信息
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ...
详细信息
暂无评论