Finding clusters based on density represents a significant class of clustering *** methods can discover clusters of various shapes and *** most studied algorithm in this class is theDensity-Based Spatial Clustering of...
详细信息
Finding clusters based on density represents a significant class of clustering *** methods can discover clusters of various shapes and *** most studied algorithm in this class is theDensity-Based Spatial Clustering of Applications with Noise(DBSCAN).It identifies clusters by grouping the densely connected objects into one group and discarding the noise *** requires two input parameters:epsilon(fixed neighborhood radius)and MinPts(the lowest number of objects in epsilon).However,it can’t handle clusters of various densities since it uses a global value for *** article proposes an adaptation of the DBSCAN method so it can discover clusters of varied densities besides reducing the required number of input parameters to only *** user input in the proposed method is the *** on the other hand,is computed automatically based on statistical information of the *** proposed method finds the core distance for each object in the dataset,takes the average of these distances as the first value of epsilon,and finds the clusters satisfying this density *** remaining unclustered objects will be clustered using a new value of epsilon that equals the average core distances of unclustered *** process continues until all objects have been clustered or the remaining unclustered objects are less than 0.006 of the dataset’s *** proposed method requires MinPts only as an input parameter because epsilon is computed from *** datasets were used to evaluate the effectiveness of the proposed method that produced promising *** experiments demonstrate that the outstanding ability of the proposed method to detect clusters of different densities even if there is no separation between *** accuracy of the method ranges from 92%to 100%for the experimented datasets.
Super-resolution techniques are used to reconstruct an image with a high resolution from one or more low-resolution image(s).In this paper,we proposed a single image super-resolution *** uses the nonlocal mean filter ...
详细信息
Super-resolution techniques are used to reconstruct an image with a high resolution from one or more low-resolution image(s).In this paper,we proposed a single image super-resolution *** uses the nonlocal mean filter as a prior step to produce a denoised *** proposed algorithm is based on curvelet *** converts the denoised image into low and high frequencies(sub-bands).Then we applied a multi-dimensional interpolation called Lancozos interpolation over both *** parallel,we applied sparse representation with over complete dictionary for the denoised *** proposed algorithm then combines the dictionary learning in the sparse representation and the interpolated sub-bands using inverse curvelet transform to have an image with a higher *** experimental results of the proposed super-resolution algorithm show superior performance and obviously better-recovering images with enhanced *** comparison study shows that the proposed super-resolution algorithm outperforms the *** mean absolute error is 0.021±0.008 and the structural similarity index measure is 0.89±0.08.
Steganography and steganalysis are two different sides of the same coin. Both are just as important as the other. Image steganography is considered one of the most promising secure data transmission methods because it...
详细信息
This paper presents a new model based on Convolutional Neural Networks (CNN) with a long short-term memory network (LSTM) and ensemble technique for identifying seven different dogs’ behaviors. The proposed model use...
详细信息
As the Internet of Things(IoT)and mobile devices have rapidly proliferated,their computationally intensive applications have developed into complex,concurrent IoT-based workflows involving multiple interdependent *** ...
详细信息
As the Internet of Things(IoT)and mobile devices have rapidly proliferated,their computationally intensive applications have developed into complex,concurrent IoT-based workflows involving multiple interdependent *** exploiting its low latency and high bandwidth,mobile edge computing(MEC)has emerged to achieve the high-performance computation offloading of these applications to satisfy the quality-of-service requirements of workflows and *** this study,we propose an offloading strategy for IoT-based workflows in a high-performance MEC *** proposed task-based offloading strategy consists of an optimization problem that includes task dependency,communication costs,workflow constraints,device energy consumption,and the heterogeneous characteristics of the edge *** addition,the optimal placement of workflow tasks is optimized using a discrete teaching learning-based optimization(DTLBO)*** experimental evaluations demonstrate that the proposed offloading strategy is effective at minimizing the energy consumption of mobile devices and reducing the execution times of workflows compared to offloading strategies using different metaheuristics,including particle swarm optimization and ant colony optimization.
One of the most common cancers among women worldwide is breast cancer (BC), and early diagnosis can save lives. Early detection of BC increases the likelihood of a successful outcome by enabling treatment to start soo...
详细信息
Nowadays, digital transformation, automation, and decision-making are critical needs. The importance of data science and improving data quality is increasing day by day due to this need. Currently, a lot of research d...
详细信息
This study addresses the challenge of selecting research topics for undergraduate students, focusing on computerscience, by evaluating a recommendation model based on the k-Nearest Neighbor algorithm (kNN). The objec...
详细信息
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable...
详细信息
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable insights into user behavior, environmental conditions, and other important factors. However, as this data is collected and processed by cloud-hosted services, there is a growing concern about privacy and security. Without adequate protection, sensitive information could be exposed to hackers or other malicious actors, putting both individuals and organizations at risk. To address this challenge, real-time privacy-preserving techniques can be used to protect IoT data without compromising its value. This paper introduces an efficient Real-time privacy-preserving scheme (RT-PPS) for cloud-hosted IoT data. RT-PPS employs multi-authority attribute-based encryption on a hybrid cloud environment to keep data secure and private, while still allowing it to be processed and analyzed by cloud-hosted services. RT-PPS has efficient response time and resource consumption, which gives it the ability to handle a huge number of concurrent users at the same time without notable delay. The proposed RT-PPS has been validated through extensive experimental evaluation on a variety of configurations. Moreover, the proposed scheme has been computationally compared with the state-of-the-artwork. RT-PPS has shown excellent performance, effectiveness, and efficiency. The RT-PPS encryption time for a 1 GB dataset while considering 1024 slices is approximately 1000 ms. Also, the RT-PPS decryption time for a 1 GB ciphertext while considering 1024 slices are approximately 235 ms. Finally, RT-PPS is proven secure against any polynomial-time attacks and their variations that have at most a negligible advantage in the introduced security model. Moreover compared to most of the state-of-the-artwork, RT-PPS reduced the ciphertext size and lowered the computations in the encryption, key g
The application of Artificial Intelligence (AI) in cybersecurity is designed to address the growing complexity and volume of cyber threats, which create significant challenges for traditional penetration testing metho...
详细信息
暂无评论