In the realm of discrete-time modeling for gene regulatory networks, significant focus has been placed on addressing the time lags inherent in the process of DNA transcription to RNA and the subsequent translation of ...
详细信息
During the unprecedented expansion of global data, efficient storage solutions are essential for processing massive datasets stored on modern storage devices. B-epsilon-tree (Bϵ-tree) is one of the most well-known tec...
详细信息
Visual secret sharing (VSS) scheme is the technology that divides a secret into shares. The decoding operation on the share is performed to restore the secret image. The quick response (QR) code is an image carrying t...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and sewage treatment facilities,oil and gas pipelines,*** recent times,these systems have suffered from cyber attacks numer-ous *** have been developing cyber security solutions for Cls to avoid lasting *** to standard frameworks,cyber security based on identification,protection,detection,response,and recovery are at the core of these *** of an ongoing attack that escapes standard protection such as firewall,anti-virus,and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the ***,anomaly detection in physical dynamics proves an effective means to implement *** is one example of anomaly detection in the sensor/actuator data,representing such systems physical *** present EPASAD,which improves the detection technique used in PASAD to detect these micro-stealthy attacks,as our experiments show that PASAD's spherical boundary-based detection fails to *** method EPASAD overcomes this by using Ellipsoid boundaries,thereby tightening the boundaries in various dimen-sions,whereas a spherical boundary treats all dimensions *** validate EPASAD using the dataset produced by the TE-process simulator and the C-town *** results show that EPASAD improves PASAD's average recall by 5.8%and 9.5%for the two datasets,respectively.
Machine Learning algorithms analyze past market data to forecast future trends in metal stock prices. Precise estimation of metal stock values is essential for industry stakeholders, policy makers, and investors. Corr...
详细信息
In this study, we comprehensively examine the potential of deep learning algorithms in the domain of medical image processing. Through a systematic analysis of existing literature, we explore the applications, methodo...
详细信息
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all...
详细信息
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods.
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine information System (TMIS), designed to streamline patient-doctor int...
详细信息
Advancements in smart applications highlight the need for increased processing and storage capacity at Smart Devices (SDs). To tackle this, Edge computing (EC) is enabled to offload SD workloads to distant edge server...
详细信息
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to...
详细信息
暂无评论