Breast Cancer (BC) remains a significant health challenge for women and is one of the leading causes of mortality worldwide. Accurate diagnosis is critical for successful therapy and increased survival rates. Recent a...
详细信息
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
This study aimed to compare the effectiveness of three predictive algorithms—logistic regression, random forest, and GBM—in predicting course completion using user engagement data from online learning platforms. By ...
详细信息
This study examines secure and effective data sharing methods for edge computing *** methods of sharing data at the edge have issues with security,speed,and *** goal is to develop a Blockchain-based Secure Data Sharin...
详细信息
This study examines secure and effective data sharing methods for edge computing *** methods of sharing data at the edge have issues with security,speed,and *** goal is to develop a Blockchain-based Secure Data Sharing Framework(BSDSF)capable of improving data integrity,latency,and overall network efficiency for edge-cloud computing *** proposes using blockchain technology with Byzantine Fault Tolerance(BFT)and smart contract-based validation as a new method of secure data *** has a two-tiered consensus protocol to meet the needs of edge computing,which requires instantaneous *** employs Byzantine fault tolerance to deal with errors and protect against *** contracts automate validation and consensus operations,while edge computing processes data at the attack *** validation and failure detection methods monitor network quality and dependability,while system security ensures secure communication between *** is an important step toward digital freedom and trust by protecting security and improving transaction *** framework demonstrates a reduction in transaction latency by up to 30%and an increase in throughput by 25%compared to traditional edge computing models,positioning BSDSF as a pivotal solution for fostering digital freedom and trust in edge computing environments.
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar...
详细信息
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent...
详细信息
Counterfeiting is still a pervasive global issue, affecting multiple industries and hindering industrial innovation, while causing substantial financial losses, reputational damage, and risks to consumer safety. From ...
详细信息
Counterfeiting is still a pervasive global issue, affecting multiple industries and hindering industrial innovation, while causing substantial financial losses, reputational damage, and risks to consumer safety. From luxury goods and pharmaceuticals to electronics and automotive parts, counterfeit products infiltrate supply chains, leading to a loss of revenue for legitimate businesses and undermining consumer trust. Traditional anti-counterfeiting measures, such as holograms, serial numbers, and barcodes, have proven to be insufficient as counterfeiters continuously develop more sophisticated replication techniques. As a result, there is a growing need for more advanced, secure, and reliable methods to prevent counterfeiting. This paper presents a novel, holistic anti-counterfeiting platform that integrates Near Field Communication (NFC)-enabled mobile applications with blockchain technology to provide an innovative, secure, and consumer-friendly authentication mechanism. Our approach addresses key gaps in existing solutions by incorporating dynamic product identifiers, which make replication significantly more difficult. The system enables consumers to verify the authenticity of products instantly using their smartphones, enhancing transparency and trust in the supply chain. Blockchain technology plays a crucial role in our proposed solution by providing an immutable, decentralized ledger that records product authentication data. This ensures that product verification records cannot be tampered with or altered, adding a layer of security that is absent in conventional systems. Additionally, NFC technology enhances security by offering unique identification capabilities, enabling real-time product verification. To validate the effectiveness of the proposed system, real-world testing was conducted across different industries. The results demonstrated the platform’s ability to significantly reduce counterfeit products in the supply chain, offering businesses and cons
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated...
详细信息
The rapid deployment of millions of connected devices brings significant security challenges to the Internet of Things (IoT). IoT devices are typically resource-constrained and designed for specific tasks, from which ...
详细信息
The rapid deployment of millions of connected devices brings significant security challenges to the Internet of Things (IoT). IoT devices are typically resource-constrained and designed for specific tasks, from which new security challenges are introduced. As such, IoT device identification has garnered substantial attention and is regarded as an initial layer of cybersecurity. One of the major steps in distinguishing IoT devices involves leveraging machine learning (ML) techniques on device network flows known as device fingerprinting. Numerous studies have proposed various solutions that incorporate ML and feature selection (FS) algorithms with different degrees of accuracy. Yet, the domain needs a comparative analysis of the accuracy of different classifiers and FS algorithms to comprehend their true capabilities in various datasets. This article provides a comprehensive performance evaluation of several reputable classifiers being used in the literature. The study evaluates the efficacy of filter-and wrapper-based FS methods across various ML classifiers. Additionally, we implemented a Binary Green Wolf Optimizer (BGWO) and compared its performance with that of traditional ML classifiers to assess the potential of this binary meta-heuristic algorithm. To ensure the robustness of our findings, we evaluated the effectiveness of each classifier and FS method using two widely utilized datasets. Our experiments demonstrated that BGWO effectively reduced the feature set by 85.11% and 73.33% for datasets 1 and 2, respectively, while achieving classification accuracies of 98.51% and 99.8%, respectively. The findings of this study highlight the strong capabilities of BGWO in reducing both the feature dimensionality and accuracy gained through classification. Furthermore, it demonstrates the effectiveness of wrapper methods in the reduction of feature sets. 2025 Tahaei et al.
The self-attention architecture is also considered to be a significant contribution in sequence processing tasks. It has the ability to highlight the distinctive features of a sequence, has been very successful in nat...
详细信息
暂无评论