We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing works on Arabic ABSA content separately address them,assume that aspect terms are preidentified,or use a pipeline *** solutions design different models for each task,and the output from the ATE model is used as the input to the APC model,which may result in error propagation among different steps because APC is affected by ATE *** methods are impractical for real-world scenarios where the ATE task is the base task for APC,and its result impacts the accuracy of ***,in this study,we focused on a multi-task learning model for Arabic ATE and APC in which the model is jointly trained on two subtasks simultaneously in a *** paper integrates themulti-task model,namely Local Cotext Foucse-Aspect Term Extraction and Polarity classification(LCF-ATEPC)and Arabic Bidirectional Encoder Representation from Transformers(AraBERT)as a shred layer for Arabic contextual text *** LCF-ATEPC model is based on a multi-head selfattention and local context focus mechanism(LCF)to capture the interactive information between an aspect and its ***,data augmentation techniques are proposed based on state-of-the-art augmentation techniques(word embedding substitution with constraints and contextual embedding(AraBERT))to increase the diversity of the training *** paper examined the effect of data augmentation on the multi-task model for Arabic *** experiments were conducted on the original and combined datasets(merging the original and augmented datasets).Experimental results demonstrate that the proposed Multi-task model outperformed existing APC *** results were obtained by AraBERT and LCF-ATEPC with fusion layer(AR-LCF-ATEPC-Fusion)and the proposed data augmentation
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
Wireless Sensor Networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural atte...
详细信息
Wireless Sensor Networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural attention,routing protocols,location exploration,time exploration,*** research aims to optimize routing protocols and address the challenges arising from conflicting objectives in WSN environments,such as balancing energy consumption,ensuring routing reliability,distributing network load,and selecting the shortest *** optimization techniques have shown success in achieving one or two objectives but struggle to achieve the right balance between multiple conflicting *** address this gap,this paper proposes an innovative approach that integrates Particle Swarm Optimization(PSO)with a fuzzy multi-objective *** proposed method uses fuzzy logic to effectively control multiple competing objectives to represent its major development beyond existing methods that only deal with one or two *** search efficiency is improved by particle swarm optimization(PSO)which overcomes the large computational requirements that serve as a major drawback of existing *** PSO algorithm is adapted for WSNs to optimize routing paths based on fuzzy multi-objective *** fuzzy logic framework uses predefined membership functions and rule-based reasoning to adjust routing *** adjustments influence PSO’s velocity updates,ensuring continuous adaptation under varying network *** proposed multi-objective PSO-fuzzy model is evaluated using NS-3 *** results show that the proposed model is capable of improving the network lifetime by 15.2%–22.4%,increasing the stabilization time by 18.7%–25.5%,and increasing the residual energy by 8.9%–16.2% compared to the state-of-the-art *** proposed model also achieves a 15%–24% reduction in load variance,demonstrating balanced routing and extended net
Text-to-image generation is a vital task in different fields,such as combating crime and terrorism and quickly arresting *** several years,due to a lack of deep learning and machine learning resources,police officials...
详细信息
Text-to-image generation is a vital task in different fields,such as combating crime and terrorism and quickly arresting *** several years,due to a lack of deep learning and machine learning resources,police officials required artists to draw the face of a *** methods of identifying criminals are inefficient and *** paper presented a new proposed hybrid model for converting the text into the nearest images,then ranking the produced images according to the available *** framework contains two main steps:generation of the image using an Identity Generative Adversarial Network(IGAN)and ranking of the images according to the available data using multi-criteria decision-making based on neutrosophic *** IGAN has the same architecture as the classical Generative Adversarial Networks(GANs),but with different modifications,such as adding a non-linear identity block,smoothing the standard GAN loss function by using a modified loss function and label smoothing,and using mini-batch *** model achieves efficient results in Inception Distance(FID)and inception score(IS)when compared with other architectures of GANs for generating images from *** IGAN achieves 42.16 as FID and 14.96 as *** it comes to ranking the generated images using Neutrosophic,the framework also performs well in the case of missing information and missing data.
Rank aggregation is the combination of several ranked lists from a set of candidates to achieve a better ranking by combining information from different sources. In feature selection problem, due to the heterogeneity ...
详细信息
Accurate prediction of solar irradiation, particularly Diffuse Horizontal Irradiance (DHI), is essential for optimizing solar energy systems. This paper presents a hybrid framework that integrates satellite imagery an...
详细信息
Accurate prediction of solar irradiation, particularly Diffuse Horizontal Irradiance (DHI), is essential for optimizing solar energy systems. This paper presents a hybrid framework that integrates satellite imagery and satellite-derived data to improve the precision of DHI forecasts. Two key datasets were employed: ground-based Solar Irradiation Measurement (SRM) and satellite-based Solar Irradiation (SSR). The proposed methodology utilizes machine learning models along two paths. The first path processes satellite imagery using advanced techniques, including pixel imputation with a modified Random Forest (RF) and Generative Adversarial Network (GAN), noisy region detection with Self-Organizing Maps (SOM), and noise removal through a Latent Diffusion Model (LDM). The second path handles tabular data through a diffusion probabilistic model designed for missing data imputation. These features are then merged and fed into a Long Short-Term Memory (LSTM) network, enhanced to capture seasonality and trends for accurate DHI predictions. The paper makes significant contributions by introducing a robust hybrid framework that leverages both satellite imagery and tabular data, incorporating novel preprocessing methods such as GAN-based pixel imputation and diffusion-based noise removal. The LSTM model is further adapted to handle seasonal and trend components, resulting in enhanced DHI forecasting accuracy. The proposed model demonstrates superior performance, achieving a Mean Squared Error (MSE) of 8.170 W/m2, Root Mean Squared Error (RMSE) of 1.749 W/m2, Mean Absolute Error (MAE) of 0.693 W/m2, and an R-squared value of 2.574, significantly outperforming conventional methods such as Artificial Neural Networks (ANN), Support Vector Regression (SVR), and traditional LSTM models. Additionally, the model records a low Mean Absolute Percentage Error (MAPE) of 0.8183% and a computation time of 35.4 s, highlighting its efficiency. These results contribute to more accurate and reli
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
暂无评论