In recent years, underwater robots have been an essential focus of marine science and technology applications. Whether it is the application of military tasks or general civil affairs, underwater robots have played a ...
详细信息
Cyberbullying is a remarkable issue in the Arabic-speaking world,affecting children,organizations,and *** efforts have been made to combat this problem through proposed models using machine learning(ML)and deep learni...
详细信息
Cyberbullying is a remarkable issue in the Arabic-speaking world,affecting children,organizations,and *** efforts have been made to combat this problem through proposed models using machine learning(ML)and deep learning(DL)approaches utilizing natural language processing(NLP)methods and by proposing relevant ***,most of these endeavors focused predominantly on the English language,leaving a substantial gap in addressing Arabic *** the complexities of the Arabic language,transfer learning techniques and transformers present a promising approach to enhance the detection and classification of abusive content by leveraging large and pretrained models that use a large ***,this study proposes a hybrid model using transformers trained on extensive Arabic *** then fine-tunes the hybrid model on a newly curated Arabic cyberbullying dataset collected from social media platforms,in particular ***,the following two hybrid transformer models are introduced:the first combines CAmelid Morphologically-aware pretrained Bidirectional Encoder Representations from Transformers(CAMeLBERT)with Arabic Generative Pre-trained Transformer 2(AraGPT2)and the second combines Arabic BERT(AraBERT)with Cross-lingual Language Model-RoBERTa(XLM-R).Two strategies,namely,feature fusion and ensemble voting,are employed to improve the model performance *** results,measured through precision,recall,F1-score,accuracy,and AreaUnder the Curve-Receiver Operating Characteristic(AUC-ROC),demonstrate that the combined CAMeLBERT and AraGPT2 models using feature fusion outperformed traditional DL models,such as Long Short-Term Memory(LSTM)and Bidirectional Long Short-Term Memory(BiLSTM),as well as other independent Arabic-based transformer models.
Recently, neural network-based inverse models have been used for multi-objective optimization. The basic idea is to approximate the mapping from the Pareto front to the Pareto set. In general, inverse modeling from a ...
详细信息
In this paper, the possibilities of deep learning approaches for sandwich structure delamination detection and prediction have been investigated. The research was divided into three parts: a validation study, a classi...
详细信息
Human activity recognition (HAR) utilizing WiFi channel state information (CSI) holds profound implications owing to the pervasive WiFi coverage in daily life. Deep learning has enabled the development of many high-pr...
详细信息
This article presents a mathematical model addressing a scenario involving a hybrid nanofluid flow between two infinite parallel *** plate remains stationary,while the other moves downward at a squeezing *** space bet...
详细信息
This article presents a mathematical model addressing a scenario involving a hybrid nanofluid flow between two infinite parallel *** plate remains stationary,while the other moves downward at a squeezing *** space between these plates contains a Darcy-Forchheimer porous medium.A mixture of water-based fluid with gold(Au)and silicon dioxide(Si O2)nanoparticles is *** contrast to the conventional Fourier's heat flux equation,this study employs the Cattaneo-Christov heat flux equation.A uniform magnetic field is applied perpendicular to the flow direction,invoking magnetohydrodynamic(MHD)***,the model accounts for Joule heating,which is the heat generated when an electric current passes through the *** problem is solved via NDSolve in *** and statistical analyses are conducted to provide insights into the behavior of the nanomaterials between the parallel plates with respect to the flow,energy transport,and skin *** findings of this study have potential applications in enhancing cooling systems and optimizing thermal management *** is observed that the squeezing motion generates additional pressure gradients within the fluid,which enhances the flow rate but reduces the frictional ***,the fluid is pushed more vigorously between the plates,increasing the flow *** the fluid experiences higher flow rates due to the increased squeezing effect,it spends less time in the region between the *** thermal relaxation,however,abruptly changes the temperature,leading to a decrease in the temperature fluctuations.
In the evolutionary multi-objective optimization (EMO) field, evolutionary algorithms have a population to store a well-converged and well-distributed solution set. In the literature, the population size is usually sp...
详细信息
With the rapid development of high-speed mobile network technology and high-precision positioning technology,the trajectory information of mobile users has received extensive attention from academia and industry in th...
详细信息
With the rapid development of high-speed mobile network technology and high-precision positioning technology,the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social *** can mine users’trajectories in Location-based Social Networks to obtain sensitive information,such as friendship groups,activity patterns,and consumption ***,mobile users’privacy and security issues have received growing attention in Location-based Social *** is crucial to strike a balance between privacy protection and data *** paper proposes a differential privacy trajectory protection method based on latent interest community detection(DPTP-LICD),ensuring strict privacy protection standards and user data ***,based on the historical trajectory information of users,spatiotemporal constraint information is extracted to construct a potential community strength model for mobile ***,the latent interest community obtained from the analysis is used to identify preferred hot spots on the user’s trajectory,and their priorities are assigned based on a popularity model.A reasonable privacy budget is allocated to prevent excessive noise from being added and rendering the protected trajectory data ***,to prevent privacy leakage,we add Laplace and exponential noise in generating preferred hot spots and recommending user interest *** and effectiveness analysis shows that our mechanism provides effective points of interest recommendations and protects users’privacy from disclosure.
Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning(ML)*** to attackers’(and/or benign equivalents’)dynamic behavior changes,t...
详细信息
Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning(ML)*** to attackers’(and/or benign equivalents’)dynamic behavior changes,testing data distribution frequently diverges from original training data over time,resulting in substantial model *** to their dispersed and dynamic nature,distributed denial-of-service attacks pose a danger to cybersecurity,resulting in attacks with serious consequences for users and *** paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service(DDOS)in the *** goal of this architecture combination is to accurately represent data and create an effective cyber security prediction *** intrusion detection system and concept drift of the network has been analyzed using secure adaptive windowing with website data authentication protocol(SAW_WDA).The network has been analyzed by authentication protocol to avoid malware *** data of network users will be collected and classified using multilayer perceptron gradient decision tree(MLPGDT)*** on the classification output,the decision for the detection of attackers and authorized users will be *** experimental results show output based on intrusion detection and concept drift analysis systems in terms of throughput,end-end delay,network security,network concept drift,and results based on classification with regard to accuracy,memory,and precision and F-1 score.
The rapid integration of interconnected healthcare devices, software, operating systems, and networks within the Internet of Medical Things (IoMT) has greatly advanced healthcare delivery. However, this interconnectiv...
详细信息
暂无评论