People may now receive and share information more quickly and easily than ever due to the widespread use of mobile networked devices. However, this can occasionally lead to the spread of false information. Such inform...
详细信息
With the rapid expansion of computer networks and information technology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p...
详细信息
Money laundering is a serious threat to global financial systems, causing instability and inflation, and especially hurting middle-class savings. This paper suggests a new way to tackle these problems by using blockch...
详细信息
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo...
详细信息
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management *** advanced technology,such as Intellig...
详细信息
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management *** advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer *** provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road ***,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological *** may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS *** this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between ***-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed *** results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.
Meta-heuristic algorithms search the problem solution space to obtain a satisfactory solution within a reasonable *** combining domain knowledge of the specific optimization problem,the search efficiency and quality o...
详细信息
Meta-heuristic algorithms search the problem solution space to obtain a satisfactory solution within a reasonable *** combining domain knowledge of the specific optimization problem,the search efficiency and quality of meta-heuristic algorithms can be significantly improved,making it crucial to identify and summarize domain knowledge within the *** this paper,we summarize and analyze domain knowledge that can be applied to meta-heuristic algorithms in the job-shop scheduling problem(JSP).Firstly,this paper delves into the importance of domain knowledge in optimization algorithm *** that,the development of different methods for the JSP are reviewed,and the domain knowledge in it for meta-heuristic algorithms is summarized and *** of this domain knowledge are analyzed,showing it is indispensable in ensuring the optimization performance of meta-heuristic ***,this paper analyzes the relationship among domain knowledge,optimization problems,and optimization algorithms,and points out the shortcomings of the existing research and puts forward research *** paper comprehensively summarizes the domain knowledge in the JSP,and discusses the relationship between the optimization problems,optimization algorithms and domain knowledge,which provides a research direction for the metaheuristic algorithm design for solving the JSP in the future.
Computational approaches can speed up the drug discovery process by predicting drug-target affinity, otherwise it is time-consuming. In this study, we developed a convolutional neural network (CNN)-based model named S...
详细信息
Neighborhood rough sets (NRS) is widely used in various fields with good adaptability, and its related information measurement plays an important role in uncertainty analysis. In the existing research, although the th...
详细信息
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of...
详细信息
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of distinguishing between truthful and deceptive *** news,a prevalent issue,particularly on social media,complicates the assessment of news *** pervasive spread of fake news not only misleads the public but also erodes trust in legitimate news sources,creating confusion and polarizing *** the volume of information grows,individuals increasingly struggle to discern credible content from false narratives,leading to widespread misinformation and potentially harmful *** numerous methodologies proposed for fake news detection,including knowledge-based,language-based,and machine-learning approaches,their efficacy often diminishes when confronted with high-dimensional datasets and data riddled with noise or *** study addresses this challenge by evaluating the synergistic benefits of combining feature extraction and feature selection techniques in fake news *** employ multiple feature extraction methods,including Count Vectorizer,Bag of Words,Global Vectors for Word Representation(GloVe),Word to Vector(Word2Vec),and Term Frequency-Inverse Document Frequency(TF-IDF),alongside feature selection techniques such as Information Gain,Chi-Square,Principal Component Analysis(PCA),and Document *** comprehensive approach enhances the model’s ability to identify and analyze relevant features,leading to more accurate and effective fake news *** findings highlight the importance of a multi-faceted approach,offering a significant improvement in model accuracy and ***,the study emphasizes the adaptability of the proposed ensemble model across diverse datasets,reinforcing its potential for broader application in real-world *** introduce a pioneering ensemble
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
暂无评论