Lung cancer is consistently ranked as the primary cause of cancer-related fatalities worldwide. The timely identification and effective treatment of lung cancer play a pivotal role in patient survival rates. Generally...
详细信息
Due to the intricacy of the process involved in segmenting and extracting the tumor regions in magnetic resonance imaging (MRI), it is quite difficult to successfully detect the diseases. Due to its critical significa...
详细信息
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per...
详细信息
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r...
详细信息
In spite of the adverse effects of the COVID-19 pandemic on the global economy, it has had a positive impact on the environment. To combat the spread of the virus, many countries, including Jordan, imposed lockdown me...
详细信息
Air pollution is one of the most common problems that the world is facing today. In fact, there are numerous causes of air pollution, including the large number of industries and automobiles that emit carbon dioxide (...
详细信息
The popularity of mobile devices with sensors is captivating the attention of researchers to modern techniques,such as the internet of things(IoT)and mobile crowdsensing(MCS).The core concept behind MCS is to use the ...
详细信息
The popularity of mobile devices with sensors is captivating the attention of researchers to modern techniques,such as the internet of things(IoT)and mobile crowdsensing(MCS).The core concept behind MCS is to use the power of mobile sensors to accomplish a difficult task collaboratively,with each mobile user completing much simpler *** paper discusses the task assignment problem in mobile crowdsensing,which is dependent on sensing time and path planning with the constraints of participant travel distance budgets and sensing time *** goal is to minimize aggregate sensing time for mobile users,which reduces energy consumption to encourage more participants to engage in sensing activities and maximize total task *** paper introduces a two-phase task assignment framework called location time-based algorithm(LTBA).LTBA is a framework that enhances task assignment in MCS,whereas assigning tasks requires overlapping time intervals between tasks and mobile users’tasks and the location of tasks and mobile users’*** process of assigning the nearest task to the mobile user’s current path depends on the ant colony optimization algorithm(ACO)and Euclidean *** combines two algorithms:(1)greedy online allocation algorithm and(2)bio-inspired traveldistance-balance-based algorithm(B-DBA).The greedy algorithm was sensing time interval-based and worked on reducing the overall sensing time of the mobile user.B-DBA was location-based and worked on maximizing total task *** results demonstrate that the average task quality is 0.8158,0.7093,and 0.7733 for LTBA,B-DBA,and greedy,*** sensing time was reduced to 644,1782,and 685 time units for LTBA,B-DBA,and greedy,*** the algorithms improves task assignment in MCS for both total task quality and sensing *** results demonstrate that combining the two algorithms in LTBA is the best performance for total task quality and total sensing time,and the greed
Online shopping and e-commerce platforms are increasingly plagued by fake reviews, which undermine consumer trust and distort purchasing decisions. This survey addresses the critical need for effective detection mecha...
详细信息
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of informati...
详细信息
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour *** applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data *** single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident *** data analysis did not support threat severity relationship with conscious care *** findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
暂无评论