In recent years, Creating Shared Value (CSV), a management strategy based on the concept of creating both economic and social value for a company, has been attracting attention, and companies are trying to put it into...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a vi...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone *** researchers have also emphasised using hybrid models to improve forecast ***,this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years,summarising data preprocessing,univariate machine learning modelling strategy,advantages and disadvantages of standalone ML techniques,hybrid models,and performance *** study focuses on two types of hybrid models:parameter optimisation-based hybrid models(OBH)and hybridisation of parameter optimisation-based and preprocessing-based hybridmodels(HOPH).Overall,this research supports the idea thatmeta-heuristic approaches precisely improveML ***’s also one of the first efforts to comprehensively examine the efficiency of various meta-heuristic approaches(classified into four primary classes)hybridised with ML *** study revealed that previous research applied swarm,evolutionary,physics,and hybrid metaheuristics with 77%,61%,12%,and 12%,***,there is still room for improving OBH and HOPH models by examining different data pre-processing techniques and metaheuristic algorithms.
Twitter is the best source for sentiment analysis, product reviews, current issues, etc. Sentiment analysis extracts positive and negative opinions from the Twitter data set, and R studio provides the best environment...
详细信息
As the Internet becomes increasingly image-centric, users face substantial challenges in efficiently locating desired images due to the inherent limitations of image search engines in interpreting visual content and k...
详细信息
Sensors are the foundation to facilitate smart cities, smart grids, and smart transportation, and distance sensors are especially important for sensing the environment and gathering information. Researchers have devel...
详细信息
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart hom...
详细信息
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)*** into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart *** Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger *** work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the *** simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a *** is done to measure the system's consistency across a variety of device *** experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
Accurate segmentation of brain tumors is a critical task in medical imaging, aiding diagnosis, treatment planning, and prognosis. This paper introduces a novel framework for brain tumor segmentation that leverages a D...
详细信息
Potatoes are essential for food production and consumption, but pests and illnesses can cause major economic losses. To quickly identify potato leaf diseases, image processing, computer vision, and deep learning can b...
详细信息
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the tas...
详细信息
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the task scheduling problem has emerged as a critical analytical topic in cloud *** primary goal of scheduling tasks is to distribute tasks to available processors to construct the shortest possible schedule without breaching precedence *** and schedules of tasks substantially influence system operation in a heterogeneous multiprocessor *** diverse processes inside the heuristic-based task scheduling method will result in varying makespan in the heterogeneous computing *** a result,an intelligent scheduling algorithm should efficiently determine the priority of every subtask based on the resources necessary to lower the *** research introduced a novel efficient scheduling task method in cloud computing systems based on the cooperation search algorithm to tackle an essential task and schedule a heterogeneous cloud computing *** basic idea of thismethod is to use the advantages of meta-heuristic algorithms to get the optimal *** assess our algorithm’s performance by running it through three scenarios with varying numbers of *** findings demonstrate that the suggested technique beats existingmethods NewGenetic Algorithm(NGA),Genetic Algorithm(GA),Whale Optimization Algorithm(WOA),Gravitational Search Algorithm(GSA),and Hybrid Heuristic and Genetic(HHG)by 7.9%,2.1%,8.8%,7.7%,3.4%respectively according to makespan.
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteri...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteristics, offers unparalleled precision in individual identification. However, the integrity and confidentiality of biometric data remain paramount concerns, given its susceptibility to compromise. This research delineates the development and implementation of an innovative framework for cancellable biometrics, focusing on facial and fingerprint recognition. This study introduces a novel cancellable biometrics framework that integrates graph theory encryption with three-dimensional chaotic logistic mapping. The methodology encompasses a multifaceted approach: initially employing graph theory for the secure and efficient encryption of biometric data, subsequently enhanced by the complexity and unpredictability of three-dimensional chaotic logistic mapping. This dual-layered strategy ensures the robustness of the encryption, thereby significantly elevating the security of biometric data against unauthorized access and potential compromise. Thus, the resulting cancellable biometrics, characterized by the ability to transform biometric data into an adjustable representation, addresses critical challenges in biometric security. It allows for the revocation and reissuance of biometric credentials, thereby safeguarding the original biometric characteristics of individuals. This feature not only enhances user privacy and data security but also introduces a dynamic aspect to biometric authentication, facilitating adaptability across diverse systems and applications. Preliminary evaluations of the proposed framework demonstrate a marked improvement in the security of face and fingerprint recognition systems. Through the application of graph theory encryption, coupled with three-dimensional chaotic logistic mapping, our framework mitigates the risks associated with t
暂无评论