Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar...
详细信息
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar flares in order to ensure the safety of human ***,the research focuses on two directions:first,identifying predictors with more physical information and higher prediction accuracy,and second,building flare prediction models that can effectively handle complex observational *** terms of flare observability and predictability,this paper analyses multiple dimensions of solar flare observability and evaluates the potential of observational parameters in *** flare prediction models,the paper focuses on data-driven models and physical models,with an emphasis on the advantages of deep learning techniques in dealing with complex and high-dimensional *** reviewing existing traditional machine learning,deep learning,and fusion methods,the key roles of these techniques in improving prediction accuracy and efficiency are *** prevailing challenges,this study discusses the main challenges currently faced in solar flare prediction,such as the complexity of flare samples,the multimodality of observational data,and the interpretability of *** conclusion summarizes these findings and proposes future research directions and potential technology advancement.
Feature selection is a crucial preprocessing step in data mining and machine learning, enhancing model performance and computational efficiency. This paper investigates the effectiveness of the Side-Blotched Lizard Op...
详细信息
Forensic audio analysis is a foundation stone of many crime investigations. In forensic evidence;the audio file of the human voice is analyzed to extract much information in addition to the content of the speech, such...
详细信息
Internet of Things (IoT) technology quickly transformed traditional management and engagement techniques in several sectors. This work explores the trends and applications of the Internet of Things in industries, incl...
详细信息
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr...
详细信息
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercriminal *** Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid *** when it comes to security,it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better *** applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the Advanced Encryption Standard(AES)algorithm to construct their main security *** this paper,a new modification for the original Twofish algorithm is proposed to strengthen its security and to take advantage of its fast *** new algorithm has been named Split-n-Swap(SnS).Performance analysis of the new modification algorithm has been performed using different measurement *** experimental results show that the complexity of the SnS algorithm exceeds that of the original Twofish algorithm while maintaining reasonable values for encryption and decryption times as well as memory utilization.A detailed analysis is given with the strength and limitation aspects of the proposed algorithm.
Face verification systems are critical in a wide range of applications,such as security systems and biometric ***,these systems are vulnerable to adversarial attacks,which can significantly compromise their accuracy a...
详细信息
Face verification systems are critical in a wide range of applications,such as security systems and biometric ***,these systems are vulnerable to adversarial attacks,which can significantly compromise their accuracy and *** attacks are designed to deceive the face verification system by adding subtle perturbations to the input *** perturbations can be imperceptible to the human eye but can cause the systemtomisclassifyor fail torecognize thepersoninthe *** this issue,weproposeanovel system called VeriFace that comprises two defense mechanisms,adversarial detection,and adversarial *** first mechanism,adversarial detection,is designed to identify whether an input image has been subjected to adversarial *** second mechanism,adversarial removal,is designed to remove these perturbations from the input image to ensure the face verification system can accurately recognize the person in the *** evaluate the effectiveness of the VeriFace system,we conducted experiments on different types of adversarial attacks using the Labelled Faces in the Wild(LFW)*** results show that the VeriFace adversarial detector can accurately identify adversarial imageswith a high detection accuracy of 100%.Additionally,our proposedVeriFace adversarial removalmethod has a significantly lower attack success rate of 6.5%compared to state-of-the-art removalmethods.
Text line segmentation is a crucial step in document processing. Although text line segmentation techniques for handwritten documents in other languages (English, Chinese, Arabic) have developed, there is still room f...
详细信息
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitti...
详细信息
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo...
详细信息
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io...
详细信息
暂无评论