This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, ...
详细信息
This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, MotionSense, and PAMAP2—to develop a generalized MLP model for classifying six human activities. Performance analysis of the fused model for each dataset reveals accuracy rates of 95.83 for WISDM, 97 for DaLiAc, 94.65 for MotionSense, and 98.54 for PAMAP2. A comparative evaluation was conducted between the fused MLP model and the individual dataset models, with the latter tested on separate validation sets. The results indicate that the MLP model, trained on the fused dataset, exhibits superior performance relative to the models trained on individual datasets. This finding suggests that multisource data fusion significantly enhances the generalization and accuracy of HAR systems. The improved performance underscores the potential of integrating diverse data sources to create more robust and comprehensive models for activity recognition.
Prenatal depression,which can affect pregnant women’s physical and psychological health and cause postpartum depression,is increasing ***,it is essential to detect prenatal depression early and conduct an attribution...
详细信息
Prenatal depression,which can affect pregnant women’s physical and psychological health and cause postpartum depression,is increasing ***,it is essential to detect prenatal depression early and conduct an attribution *** studies have used questionnaires to screen for prenatal depression,but the existing methods lack *** diagnose the early signs of prenatal depression and identify the key factors that may lead to prenatal depression from questionnaires,we present the semantically enhanced option embedding(SEOE)model to represent questionnaire *** can quantitatively determine the relationship and patterns between options and *** first quantifies options and resorts them,gathering options with little difference,since Word2Vec is highly dependent on *** resort task is transformed into an optimization problem involving the traveling salesman ***,all questionnaire samples are used to train the options’vector using ***,an LSTM and GRU fused model incorporating the cycle learning rate is constructed to detect whether a pregnant woman is suffering from *** verify the model,we compare it with other deep learning and traditional machine learning *** experiment results show that our proposed model can accurately identify pregnant women with depression and reach an F1 score of *** most relevant factors of depression found by SEOE are also verified in the *** addition,our model is of low computational complexity and strong generalization,which can be widely applied to other questionnaire analyses of psychiatric disorders.
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into block...
详细信息
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into blockchain-based Internet of Things(IoT)contexts,including smart wearables,smart homes,***,a notable vulnerability surfaces in decentralized environments where existing DP mechanisms falter in withstanding collusion *** vulnerability stems from the absence of an efficient strategy to synchronize the privacy budget consumption and historical query information among all network *** can exploit this weakness,collaborating to inject a substantial volume of queries simultaneously into disparate blockchain nodes to extract more precise *** address this issue,we propose a novel dual response DP mechanism to preserve privacy in blockchain-based IoT *** encompasses both direct and indirect response strategies,enabling an adaptive response to external queries,aiming to provide better data utility while preserving ***,this mechanism can synchronize historical query information and privacy budget consumption within the blockchain network to prevent privacy *** employ Relative Error(RE),Mean Square Error(MSE),and privacy budget consumption as evaluation metrics to measure the performance of the proposed *** outcomes substantiate that the proposed mechanism can adapt to blockchain networks well,affirming its capacity for privacy and great utility.
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar...
详细信息
We plan to develop a specialized training system to enhance the competitive skills of players in the first-person shooter game "Valorant", aiming to improve their abilities and tactical understanding within ...
详细信息
The primary concern of modern technology is cyber attacks targeting the Internet of *** it is one of the most widely used networks today and vulnerable to ***-time threats pose with modern cyber attacks that pose a gr...
详细信息
The primary concern of modern technology is cyber attacks targeting the Internet of *** it is one of the most widely used networks today and vulnerable to ***-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or *** Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these *** of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)*** paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT *** a hybrid method for selecting relevant features,And also how to choose highly efficient *** gives the model a high ability to detect distributed denial-of-service *** model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system *** were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 *** evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 ***,a comparative analysis with recent related works highlighted the superiority of our methodology in in
The growth of the internet and technology has had a significant effect on social *** information has become an important research topic due to the massive amount of misinformed content on social *** is very easy for a...
详细信息
The growth of the internet and technology has had a significant effect on social *** information has become an important research topic due to the massive amount of misinformed content on social *** is very easy for any user to spread misinformation through the ***,misinformation is a problem for professionals,organizers,and ***,it is essential to observe the credibility and validity of the News articles being shared on social *** core challenge is to distinguish the difference between accurate and false *** studies focus on News article content,such as News titles and descriptions,which has limited their ***,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user *** the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and *** calculate user credibility and combine it with article content with the user’s *** combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or ***,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required *** dataset contains 23000+articles with millions of user *** highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest *** discoveries confirmed that the proposed classifier would effectively classify misinformat
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent...
详细信息
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit pr...
详细信息
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit properties(e.g., degree distribution) of the sample. However, the existing sampling techniques are inadequate for the current sampling task: sampling the clustering structure, which is a crucial property of the current networks. In this paper, using different expansion strategies, two novel top-leader sampling methods(i.e., TLS-e and TLS-i) are proposed to obtain representative samples, and they are capable of effectively preserving the clustering structure. The rationale behind them is to select top-leader nodes of most clusters into the sample and then heuristically incorporate peripheral nodes into the sample using specific expansion strategies. Extensive experiments are conducted to investigate how well sampling techniques preserve the clustering structure of graphs. Our empirical results show that the proposed sampling algorithms can preserve the population's clustering structure well and provide feasible solutions to sample the clustering structure from large-scale graphs.
Advanced Persistent Threats are a sophisticated and persistent form of cyberattack that pose significant threats to the information security of enterprises and governments. Traditional APT detection methods struggle t...
详细信息
暂无评论