With the emerging of quantum PCs that have incredibly strong attributes, the Diffie-Hellman (DH) is an encryption algorithm set of rules used to guarantee communication between two users through a communication channe...
详细信息
We describe the first algorithm to compute the outer common tangents of two disjoint simple polygons using linear time and only constant workspace. A tangent of a polygon is a line touching the polygon such that all o...
详细信息
Fuzzy decision trees exploit the popularity of decision tree algorithms for practical knowledge acquisition and the representative power of the fuzzy technology. They are extensions of IDS trees, with the tree-buildin...
详细信息
Fuzzy decision trees exploit the popularity of decision tree algorithms for practical knowledge acquisition and the representative power of the fuzzy technology. They are extensions of IDS trees, with the tree-building routine modified to utilize fuzzy instead of strict domains, and with new inferences combining fuzzy defuzzification with the inductive methodology. As ID3 trees, they require that real-valued and multivalued domains be partitioned prior to tree construction. In this paper, we introduce a methodology aimed at relaxing this requirement. This is done by optimizing the domain partitions. This optimization is based on genetic algorithms, designed to process constraints associated with this task. A simple illustration is also given.
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the *** fundamental problem with WSN is that it has afinite *** a network is a common strategy for increasing the life-time of WSNs an...
详细信息
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the *** fundamental problem with WSN is that it has afinite *** a network is a common strategy for increasing the life-time of WSNs and,as a result,allowing for faster data *** cluster-ing algorithm’s goal is to select the best cluster head(CH).In the existing system,Hybrid grey wolf sunflower optimization algorithm(HGWSFO)and optimal clus-ter head selection method is *** does not provide better competence and out-put in the ***,the proposed Hybrid Grey Wolf Ant Colony Optimisation(HGWACO)algorithm is used for reducing the energy utilization and enhances the lifespan of the *** hole method is used for selecting the cluster heads(CHs).The ant colony optimization(ACO)technique is used tofind the route among origin CH and *** open cache of nodes,trans-mission power,and proximity are used to improve the CH *** grey wolf optimisation(GWO)technique is the most recent and well-known optimiser module which deals with grey wolves’hunting activity(GWs).These GWs have the ability to track down and encircle *** GWO method was inspired by this hunting *** proposed HGWACO improves the duration of the net-work,minimizes the power consumption,also it works with the large-scale *** HGWACO method achieves 25.64%of residual energy,25.64%of alive nodes,40.65%of dead nodes also it enhances the lifetime of the network.
Cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National Institute ...
详细信息
ISBN:
(数字)9798331530983
ISBN:
(纸本)9798331530990
Cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National Institute of Standards and Technology (NIST) and MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) databases together. In contrast to existing methods, this framework combines, in unique and unprecedented fashion, ensemble ML models and Realtime data processing for increased detection accuracy and reduced false positives. This approach addresses specific challenges in the cloud environments and by leveraging standardised frameworks, it offers actionable audiences for efficient and effective vulnerability management process. The framework is validated by the experimental results which prove its robustness to evolution of the cybersecurity demands.
Fuzzy Rule-based Models (FRMs) have attracted significant interest in the field of machine learning owing to their modular architecture, robust design methodologies, and sound interpretability. This study introduces a...
详细信息
Semantic web has recently gained a great attention due to its potential for providing a common framework that allows data sharing and reprocessed, relational databases are still the most used. To deal with the variety...
详细信息
Let{Yi;-∞〈i〈∞}be a doubly infinite sequence of identically distributed φ-mixing random variables and let{ai;-∞〈i〈∞}be an absolutely summable sequence of real numbers. In this paper we study the moments of su...
详细信息
Let{Yi;-∞〈i〈∞}be a doubly infinite sequence of identically distributed φ-mixing random variables and let{ai;-∞〈i〈∞}be an absolutely summable sequence of real numbers. In this paper we study the moments of sup n〉1k=1-|∞∑^n∑^∞aiYi+k/n^1/r|^p(1〈r〈2,P〉0)under the conditions of some moments.
Introduction: The present study was conducted to measure the specific activities of 226Ra,232Th and 40K, in some samples of nuts collected from the local markets in Iraq. In addition, this study sought to calculate th...
详细信息
A proposed mathematical model of filling formation describes the evolution of the free surface of a filling and transport of cohesionless polydisperse granular material during some typical operations of bulk solids ha...
详细信息
A proposed mathematical model of filling formation describes the evolution of the free surface of a filling and transport of cohesionless polydisperse granular material during some typical operations of bulk solids handling. The form of free surface is determined as a solution of an evolutionary variational inequality. Equations of material transport allow us to find the distribution of different materials inside the granular body and to take into account the free-surface segregation of polydisperse bulk material.
暂无评论