In the year passed, rarely a month passes without a ransomware incident being published in a newspaper or social media. In addition to the rise in the frequency of ransomware attacks, emerging attacks are very effecti...
详细信息
Microelectromechanical system (MEMS) based pressure sensors have been utilized for decades;however, new trends in pressure sensors have recently emerged, such as increased sensitivity, a broader range and reduced chip...
详细信息
Rumors regarding epidemic diseases such as COVID 19,medicines and treatments,diagnostic methods and public emergencies can have harmful impacts on health and political,social and other aspects of people’s lives,espec...
详细信息
Rumors regarding epidemic diseases such as COVID 19,medicines and treatments,diagnostic methods and public emergencies can have harmful impacts on health and political,social and other aspects of people’s lives,especially during emergency situations and health *** huge amounts of content being posted to social media every second during these situations,it becomes very difficult to detect fake news(rumors)that poses threats to the stability and sustainability of the healthcare sector.A rumor is defined as a statement for which truthfulness has not been *** COVID 19,people found difficulty in obtaining the most truthful news easily because of the huge amount of unverified information on social *** methods have been applied for detecting rumors and tracking their sources for COVID 19-related ***,very few studies have been conducted for this purpose for the Arabic language,which has unique ***,this paper proposes a comprehensive approach which includes two phases:detection and *** the detection phase of the study carried out,several standalone and ensemble machine learning methods were applied on the Arcov-19 dataset.A new detection model was used which combined two models:The Genetic Algorithm Based Support Vector Machine(that works on users’and tweets’features)and the stacking ensemble method(that works on tweets’texts).In the tracking phase,several similarity-based techniques were used to obtain the top 1%of similar tweets to a target tweet/post,which helped to find the source of the *** experiments showed interesting results in terms of accuracy,precision,recall and F1-Score for rumor detection(the accuracy reached 92.63%),and showed interesting findings in the tracking phase,in terms of ROUGE L precision,recall and F1-Score for similarity techniques.
Lung diseases pose a significant global health challenge, requiring timely and accurate diagnosis for effective treatment. This research addresses the limitations of conventional diagnostic methods by proposing a nove...
详细信息
Question Answering (QA) has enticed the interest of NLP community in recent years. NLP enthusiasts are engineering new Models and fine-tuning the existing ones that can give out answers for the posed questions. The de...
详细信息
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormo...
详细信息
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormous increase in these reviews has raised the need for an automated system to analyze these reviews to rate these *** Analysis(SA)is a technique that performs such decision *** research targets the ranking and rating through sentiment analysis of these reviews,on different *** a case study,Songs are opted to design and test the decision *** aspects of songs namely music,lyrics,song,voice and video are *** the reason,reviews of 20 songs are scraped from YouTube,pre-processed and formed a *** machine learning algorithms—Naïve Bayes(NB),Gradient Boost Tree,Logistic Regression LR,K-Nearest Neighbors(KNN)and Artificial Neural Network(ANN)are *** performed the best with 74.99%*** are validated using K-Fold.
Addressing the persistent challenge of student dropout, particularly prevalent in developing countries like India, Bangladesh, etc. are of paramount importance. Factors such as poverty, natural calamities, and early m...
详细信息
Data is a crucial asset in any business, and for some businesses, it ranks among the most valuable. More and more businesses want to keep their data on the cloud and securely and efficiently distribute it among their ...
详细信息
In June 2022, the Ministry of Public Health of Thailand announced that cannabis can be used in healthcare, medical, research, and commerce. This announcement led to a wide discussion in social media, TV broadcasts, an...
详细信息
With the rapid miniaturization in sensor technology,Internet-ofDrones(IoD)has delighted researchers towards information transmission security among drones with the control station server(CSS).In IoD,the drone is diffe...
详细信息
With the rapid miniaturization in sensor technology,Internet-ofDrones(IoD)has delighted researchers towards information transmission security among drones with the control station server(CSS).In IoD,the drone is different in shapes,sizes,characteristics,and *** can be classified on the purpose of its deployment,either in the civilian or military ***’s manufacturing,equipment installation,power supply,multi-rotor system,and embedded sensors are not issues for *** main thing is to utilize a drone for a complex and sensitive task using an infrastructureless/self-organization/resource-less network type called Flying Ad Hoc Network(FANET).Monitoring data transmission traffic,emergency and rescue operations,border surveillance,search and physical phenomenon sensing,and so on can be achieved by developing a robust mutual authentication and cross-verification scheme for IoD deployment civilian *** several protocols are available in the literature,they are either design issues or suffering from other vulnerabilities;still,no one claims with conviction about foolproof security ***,in this paper,the researchers highlighted the major deficits in prior protocols of the domain,i.e.,these protocols are either vulnerable to forgery,side channel,stolen-verifier attacks,or raised the outdated data transmission *** order to overcome these loopholes and provide a solution to the existing vulnerabilities,this paper proposed an improved and robust public key infrastructure(PKI)based authentication scheme for the IoD *** proposed protocol’s security analysis section has been conducted formally using BAN(Burrows-Abadi-Needham)logic,ProVerif2.03 simulation,and informally using discussion/pragmatic *** the performance analysis section of the paper has been assessed by considering storage,computation,and communication *** comparing the proposed protocol with prior works,it has been demonstrate
暂无评论