The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tiles in turn until they complete a winning hand. An important notion in Mahjong is the deficiency number(*** number in Japanese Mahjong) of a hand, which estimates how many tile changes are necessary to complete the hand into a winning hand. The deficiency number plays an essential role in major decision-making tasks such as selecting a tile to discard. This paper proposes a fast algorithm for computing the deficiency number of a Mahjong hand. Compared with the baseline algorithm, the new algorithm is usually 100 times faster and, more importantly,respects the agent's knowledge about available tiles. The algorithm can be used as a basic procedure in all Mahjong variants by both rule-based and machine learning-based Mahjong AI.
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g....
详细信息
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,***, the research on RomanUrdu is not up to the ***, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meet...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meeting the Service Level Agreement(SLA).To consolidate the workloads,the hosts are segregated into three categories:normal hosts,under-loaded hosts,and over-loaded hosts based on their *** is to be noted that the identification of an extensively used host or underloaded host is challenging to ***-old values were proposed in the literature to detect this *** current study aims to improve the existing methods that choose the underloaded hosts,get rid of Virtual Machines(VMs)from them,andfinally place them in some other *** researcher proposes a Host Resource Utilization Aware(HRUAA)Algorithm to detect those underloaded and place its virtual machines on different hosts in a vibrant Cloud *** mechanism presented in this study is contrasted with existing mechanisms *** results attained from the study estab-lish that numerous hosts can be shut down,while at the same time,the user's workload requirement can also be *** proposed method is energy-efficient in workload consolidation,saves cost and time,and leverages active hosts.
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military *** make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the *** data have to be picked up by the sensor,and then sent to the sink node where they may be *** nodes of the WSNs are powered by batteries,therefore they eventually run out of *** energy restriction has an effect on the network life span and environmental *** objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of *** lifespan of WSNs is being extended often using clustering and routing *** Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do *** cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node *** on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS *** overall experimentation is carried out under the MATLAB *** the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption.
This paper put forward an embedded scheme to execute image watermarking in light of the discrete wavelet transform (DWT), singular value decomposition (SVD) and Charge System Search (CSS) method. In the proposed schem...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv...
详细信息
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their ***,every year,a large amount of data related to epidemic outbreaks,particularly Twitter data is generated by *** paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM,along with the ML and DL techniques that have been configured for the detection of epidemic *** has emerged as a promising ML technique that adaptsmultiple layers of representations or features of the data and yields state-of-the-art extrapolation *** recent years,along with the success of ML and DL in many other application domains,both ML and DL are also popularly used in SM *** paper aims to provide an overview of epidemic outbreaks in SM and then outlines a comprehensive analysis of ML and DL approaches and their existing applications in SM ***,this review serves the purpose of offering suggestions,ideas,and proposals,along with highlighting the ongoing challenges in the field of early outbreak detection that still need to be addressed.
Globalization, industry, and population growth is considered the main reasons for climate change, so when some natural calamity or disaster occurs in any area, it leads to isolating this area from the rest of the regi...
详细信息
Efficient operations in distributed environments can be obtained by load balancing (LB). LB has turned out to be a vital and interesting research area with respect to the cloud owing to the swift augmentation of cloud...
详细信息
暂无评论