This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
Cyber-physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information a...
详细信息
Wilga 2024 Summer Symposium on Photonics Applications and Web engineering was the 52th edition of the research and technical meetings series. Traditionally, the annual series of technical conferences and topical sessi...
详细信息
CONTEXT: Web applications are exposed to malicious accesses through the Internet. SQL injection (SQLi) attacks are still a typical threat to web application providers. Although recent studies proposed deep learning-ba...
详细信息
A nevertheless-emerging generation called cloud computing permits customers to pay for services on a usage-based foundation. Internet-primarily based IT offerings are supplied through cloud computing, at the same time...
详细信息
Breast cancer, the most common cancer affecting female patients, presents serious challenges for proper detection. Although computer-aided diagnostic techniques have progressed, their accuracy and efficacy remain limi...
详细信息
With the growing adoption of cloud computing in both public and private sector enterprises, the industry has experienced rapid expansion. To fully unlock the potential of cloud computing, efficient task scheduling bec...
详细信息
With the growing adoption of cloud computing in both public and private sector enterprises, the industry has experienced rapid expansion. To fully unlock the potential of cloud computing, efficient task scheduling becomes crucial. In cloud computing, task scheduling involves optimizing the allocation of tasks to a diverse range of resources, such as virtual machines, with the goals of reducing makespan, maximizing resource utilization, and minimizing response times. This challenge becomes even more pronounced for large-scale tasks due to the NP-hard nature of the problem. Consequently, the integration of metaheuristic algorithms into task scheduling has emerged as a solution to equitably distribute complex and diverse tasks across limited resources within acceptable timeframes. To enhance the quality of cloud computing services, this research introduces the modified white shark optimizer (mWSO) as an alternative task scheduling technique. The improved variant mWSO boosts the performance of the original WSO by introducing the following three enhancement steps: (1) introduce memory-based WSO to boost the exploitation phase, (2) propose an exploration-exploitation balance phase to enhance the exploration phase, and (3) introduce a control randomization parameter to balance exploration and exploitation properly. The mWSO is subjected to testing on both the global optimization problems from CEC2020 and cloud task scheduling problems. The experimental results of mWSO demonstrate high performance for CEC2020 competition benchmarks compared to other state-of-the-art and recent metaheuristic algorithms. In the case of the task scheduling problem, the mWSO achieved − 0.01 to 13.53% and 0.62–10.42% makespan and energy consumption reduction, respectively, for CEA-Curie workloads. For HPC2N workloads, mWSO achieved 7.27–29.53% makespan reduction and 3.52–26.08% energy savings over the compared metaheuristics. The statistical validity of the performance is also verified using Wil
Automatic Text Summarization (ATS) for long documents is a very challenging task. A long document includes more than one topic, so it is required to construct a summary that covers the most important contextual inform...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical images against impostors and *** this paper,an optical medical image security approach is *** is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and *** confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security ***,a comparative analysis is introduced between the suggested security approach and other conventional cryptography *** simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly *** has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
Telemarketing is a well-established marketing approach to offering products and services to prospective *** effectiveness of such an approach,however,is highly dependent on the selection of the appropriate consumer ba...
详细信息
Telemarketing is a well-established marketing approach to offering products and services to prospective *** effectiveness of such an approach,however,is highly dependent on the selection of the appropriate consumer base,as reaching uninterested customers will induce annoyance and consume costly enterprise resources in vain while missing interested *** introduction of business intelligence and machine learning models can positively influence the decision-making process by predicting the potential customer base,and the existing literature in this direction shows promising ***,the selection of influential features and the construction of effective learning models for improved performance remain a ***,from the modelling perspective,the class imbalance nature of the training data,where samples with unsuccessful outcomes highly outnumber successful ones,further compounds the problem by creating biased and inaccurate ***,customer preferences are likely to change over time due to various reasons,and/or a fresh group of customers may be targeted for a new product or service,necessitating model retraining which is not addressed at all in existing works.A major challenge in model retraining is maintaining a balance between stability(retaining older knowledge)and plasticity(being receptive to new information).To address the above issues,this paper proposes an ensemble machine learning model with feature selection and oversampling techniques to identify potential customers more accurately.A novel online learning method is proposed for model retraining when new samples are available over *** newly introduced method equips the proposed approach to deal with dynamic data,leading to improved readiness of the proposed model for practical adoption,and is a highly useful addition to the *** experiments with real-world data show that the proposed approach achieves excellent results in all cases(e.g.,98.6
暂无评论