The growth of the internet and technology has had a significant effect on social *** information has become an important research topic due to the massive amount of misinformed content on social *** is very easy for a...
详细信息
The growth of the internet and technology has had a significant effect on social *** information has become an important research topic due to the massive amount of misinformed content on social *** is very easy for any user to spread misinformation through the ***,misinformation is a problem for professionals,organizers,and ***,it is essential to observe the credibility and validity of the News articles being shared on social *** core challenge is to distinguish the difference between accurate and false *** studies focus on News article content,such as News titles and descriptions,which has limited their ***,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user *** the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and *** calculate user credibility and combine it with article content with the user’s *** combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or ***,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required *** dataset contains 23000+articles with millions of user *** highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest *** discoveries confirmed that the proposed classifier would effectively classify misinformat
Taiwan plays a significant role in global seafood supply chains, accounting for approximately 10% of global tuna catches. The country is a substantial producer of tuna, shrimp, and squid, and its seafood industry is w...
详细信息
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)*** the emergence of IoT...
详细信息
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)*** the emergence of IoT-based services,the industry of internet-based devices has *** number of these devices has raised from millions to billions,and it is expected to increase further in the near ***,additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user *** data aggregation models for Fog enabled IoT environ-ments possess high computational complexity and communication ***-fore,in order to resolve the issues and improve the lifetime of the network,this study develops an effective hierarchical data aggregation with chaotic barnacles mating optimizer(HDAG-CBMO)*** HDAG-CBMO technique derives afitness function from many relational matrices,like residual energy,average distance to neighbors,and centroid degree of target ***,a chaotic theory based population initialization technique is derived for the optimal initial position of ***,a learning based data offloading method has been developed for reducing the response time to IoT user requests.A wide range of simulation analyses demonstrated that the HDAG-CBMO technique has resulted in balanced energy utilization and prolonged lifetime of the Fog assisted IoT networks.
This paper introduces a new approach to switch authentication within a network environment, addressing the challenges associated with multiple switch configurations. The proposed continuous authentication process is s...
详细信息
This paper presents a novel approach aimed at developing a secure secret key-sharing system optimized for resource-constrained Internet of Things (IoT) devices. Focusing on the MQTT protocol, the research endeavors to...
详细信息
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to t...
详细信息
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to the data. Nowadays most of the hospitals use electronic methods to store and transmit data with basic security measures, but these methods are still vulnerable. There is no perfect solution that solves the security problems in any industry, especially healthcare. So, to cope with the arising need to increase the security of the data from being manipulated the proposed method uses a hybrid image encryption technique to hide the data in an image so it becomes difficult to sense the presence of data in the image while transmission. It combines Least Significant Bit (LSB) Algorithm using Arithmetic Division Operation along with Canny edge detection to embed the patient data in medical images. The image is subsequently encrypted using keys of six different chaotic maps sequentially to increase the integrity and robustness of the system. Finally, an encrypted image is converted into DNA sequence using DNA encoding rule to improve reliability. The experimentation is done on the Chest XRay image, Knee Magnetic Resonance Imaging (MRI) image, Neck MRI image, Lungs Computed Tomography (CT) Scan image datasets and patient medical data with 500 characters, 1000 characters and 1500 characters. And, it is evaluated based on time coefficient of encryption and decryption, histogram, entropy, similarity score (Mean Square Error), quality score (peak signal-to-noise ratio), motion activity index (number of changing pixel rate), unified average changing intensity, image similarity score (structure similarity index measurement) between original and encrypted images. Also, the proposed technique is compared with other recent state of arts methods for 500 characters embedding and performed better than those techniques. The proposed method is more stable and embeds comparativel
Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)*** plays a vital role in infl...
详细信息
Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)*** plays a vital role in influencing crop *** wastage and pollution of farmland's natural atmosphere instigated by full coverage chemical herbicide spraying are *** the proper identification of weeds from crops helps to reduce the usage of herbicide and improve productivity,this study presents a novel computer vision and deep learning based weed detection and classification(CVDL-WDC)model for precision *** proposed CVDL-WDC technique intends to prop-erly discriminate the plants as well as *** proposed CVDL-WDC technique involves two processes namely multiscale Faster RCNN based object detection and optimal extreme learning machine(ELM)based weed *** parameters of the ELM model are optimally adjusted by the use of farmland fertility optimization(FFO)algorithm.A comprehensive simulation analysis of the CVDL-WDC technique against benchmark dataset reported the enhanced out-comes over its recent approaches interms of several measures.
This article investigates the impact of Artificial Intelligence (AI) and ChatGPT in the business sector. It highlights the evolution of AI, focusing on the integration and applications of technologies like machine lea...
详细信息
The sharing of encrypted data in cloud computing is an essential functionality with countless applications in our everyday life. However, the issue of how to securely, efficiently and flexibly share encrypted data in ...
详细信息
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity...
详细信息
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity,confidentiality,and integrity in their respective use cases(especially in industrial fields).Additionally,cloud computing has been in use for several years *** information is exchanged with cloud infrastructure to provide clients with access to distant resources,such as computing and storage activities in the *** are also significant security risks,concerns,and difficulties associated with cloud *** address these challenges,we propose merging BC and SDN into a cloud computing platform for the *** paper introduces“DistB-SDCloud”,an architecture for enhanced cloud security for smart IIoT *** proposed architecture uses a distributed BC method to provide security,secrecy,privacy,and integrity while remaining flexible and *** in the industrial sector benefit from the dispersed or decentralized,and efficient environment of ***,we described an SDN method to improve the durability,stability,and load balancing of cloud *** efficacy of our SDN and BC-based implementation was experimentally tested by using various parameters including throughput,packet analysis,response time,bandwidth,and latency analysis,as well as the monitoring of several attacks on the system itself.
暂无评论