Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health ...
详细信息
Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health of the ***,researchers often focus on identifying the illegal beha-viors in the SNS to reduce its negative infl*** state-of-art Natural Language processing techniques for anomaly detection have utilized a wide anno-tated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum *** overcome these issues,the proposed methodology utilizes a Modified Convolutional Neural Network(MCNN)using stochastic pooling and a Leaky Rectified Linear Unit(LReLU).Here,each word in the social media text is analyzed based on its *** stochastic pooling accurately detects the anomalous social media posts and reduces the chance of overfi*** LReLU overcomes the high computational cost and gradient vanishing problem associated with other activation *** also doesn’t stop the learning process when the values are *** MCNN computes a specified score value using a novel integrated anomaly detection *** on the score value,the anomalies are identified.A Teaching Learn-ing based Optimization(TLBO)algorithm has been used to optimize the feature extraction phase of the modified CNN and fast convergence is *** this way,the performance of the model is enhanced in terms of classification *** efficiency of the proposed technique is compared with the state-of-art techni-ques in terms of accuracy,sensitivity,specificity,recall,and *** proposed MCNN-TLBO technique has provided an overall architecture of 97.85%,95.45%,and 97.55%for the three social media datasets namely Facebook,Twitter,and Reddit respectively.
The Human Mobility Signature Identification (HuMID) problem stands as a fundamental task within the realm of driving style representation, dedicated to discerning latent driving behaviors and preferences from diverse ...
详细信息
The rating & review of an app in the App Store or Play Store plays an essential role for end users to get information about the app based on other people's experiences with that app. The reviews might be conte...
详细信息
Vitamin deficiency is a pervasive health issue affecting millions globally, often leading to severe health complications if undiagnosed. Various vitamin deficiencies can be identified by identifiable symptoms manifest...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN *** it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes(SN)in a WSN is always a challenging *** this research paper,Distance Matrix and Markov Chain(DM-MC)model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the *** method further employs a Markov Chain Model(MCM)for energy optimization and interference *** are performed against two well-known models,and the results demonstrate that the proposed algorithm improves performance by using less network resources when compared to the existing *** probability is used in the Markova chain to sustain higher energy ***,the proposed Distance Matrix and Markov Chain model decrease energy use by 31%and 25%,respectively,compared to the existing DV-Hop and CSA *** experimental results were performed against two proven models,Distance VectorHop Algorithm(DV-HopA)and Crow Search Algorithm(CSA),showing that the proposed DM-MC model outperforms both the existing models regarding localization accuracy and Energy Consumption(EC).These results add to the credibility of the proposed DC-MC model as a better model for employing node localization while establishing a WSN framework.
The global impact of ransomware on cybersecurity has increased alarmingly in recent years. It is the cause of important financial damage for individuals as well as for corporations. From the early days of computers, t...
详细信息
The evaluation of generative models in Machine Reading Comprehension (MRC) presents distinct difficulties, as traditional metrics like BLEU, ROUGE, METEOR, Exact Match, and F1 score often struggle to capture the nuanc...
Sleep is referred as a cyclic process which is the most important part in human life. The sleep disorder and its stages are observed from time waveforms such as Electroencephalogram (EEG), Electrocardiograms (ECG), an...
详细信息
Community detection is an essential technique for uncovering structural patterns in complex networks, such as social, biological, and information networks. In this paper to explore a hybrid approach to community detec...
详细信息
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in...
详细信息
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in the fog computing environment is a pivotal *** different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing ***,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog *** Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,*** boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat *** sequence generated by this map is used to transform the coordinates of the fog *** improved range of the proposed map is depicted using bifurcation *** quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate *** also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical *** experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature.
暂无评论