This paper proposes a face recognition system based on steerable pyramid transform (SPT) and local directional pattern (LDP) for e-health secured login in cloud domain. In an e-health login, patients periodically forg...
详细信息
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)***,because the MCvD is unre...
详细信息
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)***,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is *** this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift *** fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)*** the previous work,the probability of bit error is expressed in a closed-form *** is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano *** simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget.
Human values capture what people and societies perceive as desirable, transcend specific situations and serve as guiding principles for action. People’s value systems motivate their positions on issues concerning the...
详细信息
To address the low-voltage, high-current requirements in hydrogen production applications, a virtual 48-pulse three-phase rectifier is proposed, and achieves the equivalent performance of four parallel 12-pulse rectif...
详细信息
In this paper, the problem of finding exact solutions to the magnetohydrodynamic(MHD) equations in the presence of incompressible mass flows with helical symmetry is considered. For ideal flows, a similarity reduction...
详细信息
In this paper, the problem of finding exact solutions to the magnetohydrodynamic(MHD) equations in the presence of incompressible mass flows with helical symmetry is considered. For ideal flows, a similarity reduction method is used to obtain exact solutions for several MHD flows with nonlinear variable Mach number. For resistive flows parallel to a magnetic field, the governing equilibrium equation is derived. The MHD equilibrium state of a helically symmetric incompressible flow is governed by a second-order elliptic partial differential equation(PDE) for the helical magnetic flux function. Exact solutions for the latter equation are obtained. Also, the equilibrium equations of a gravitating plasma with incompressible flow are derived.
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
One of the challenges of treating lung tumors in radiation therapy is the patient's respiratory movements during the treatment, which lead to tumor motion. The goal of respiratory motion prediction is to predict t...
详细信息
Forecasting the price of bitcoins is significant in contemporary research, given the fact that the digital currency is relatively unpredictable and highly integrated in global securities markets. This paper compares t...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
To train sentiment classifiers, a collective multi-Trends sentiment classification approach is proposed for numerous tweets simultaneously. This technique uses sentiment facts from exceptional tweets to train accurate...
详细信息
暂无评论