Human emotions are the mind's responses to external stimuli, and due to their dynamic and unpredictable nature, research in this field has become increasingly important. There is a growing trend in utilizing deep ...
详细信息
Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Exis...
详细信息
Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands subst...
详细信息
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap...
详细信息
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers(BERT)base model(cased),originally pretrained in *** model is uniquely adapted to recognize the intricate nuances of Arabic online communication,a key aspect often overlooked in conventional cyberbullying detection *** model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media(SM)tweets showing a notable increase in detection accuracy and sensitivity compared to existing *** results on a diverse Arabic dataset collected from the‘X platform’demonstrate a notable increase in detection accuracy and sensitivity compared to existing methods.E-BERT shows a substantial improvement in performance,evidenced by an accuracy of 98.45%,precision of 99.17%,recall of 99.10%,and an F1 score of 99.14%.The proposed E-BERT not only addresses a critical gap in cyberbullying detection in Arabic online forums but also sets a precedent for applying cross-lingual pretrained models in regional language applications,offering a scalable and effective framework for enhancing online safety across Arabic-speaking communities.
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military *** make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the *** data have to be picked up by the sensor,and then sent to the sink node where they may be *** nodes of the WSNs are powered by batteries,therefore they eventually run out of *** energy restriction has an effect on the network life span and environmental *** objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of *** lifespan of WSNs is being extended often using clustering and routing *** Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do *** cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node *** on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS *** overall experimentation is carried out under the MATLAB *** the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption.
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
Magnesium chips were coated with a high concentration of graphite using a binder and were used as the raw material for injection molding. The microstructure of the magnesium injection-molded product with added graphit...
详细信息
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of p...
详细信息
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of patientscan ensure remote healthcare at home using advanced technologies such as the Internet of Medical Things (IoMT).The IoMT can monitor and transmit sensitive health data;however, it may be vulnerable to various attacks. In thispaper, an efficient healthcare security system is proposed for IoMT applications. In the proposed system, themedical sensors can transmit sensed encrypted health data via a mobile application to the doctor for ***, three consortium blockchains are constructed for load balancing of transactions and reducing transactionlatency. They store the credentials of system entities, doctors' prescriptions and recommendations according to thedata transmitted via mobile applications, and the medical treatment process. Besides, cancelable biometrics areused for providing authentication and increasing the security of the proposed medical system. The investigationalresults show that the proposed system outperforms existing work where the proposed model consumed lessprocessing time by values of 18%, 22%, and 40%, and less energy for processing a 200 KB file by values of 9%,13%, and 17%. Finally, the proposed model consumed less memory usage by values of 7%, 7%, and 18.75%. Fromthese results, it is clear that the proposed system gives a very reliable and secure performance for efficientlysecuring medical applications.
This research work focuses on food recognition, especially, the identification of the ingredients from food images. Here, the developed model includes two stages namely: 1) feature extraction;2) classification. Initia...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
暂无评论