Hydrothermal carbonization (HTC) was employed to convert cannabis waste into valuable solid fuel (hydrochar) under different operating conditions, including reaction temperature (170–230 °C), biomass-water ...
详细信息
Security systems are the need of the hour to protect data from unauthorized *** dissemination of confidential information over the public network requires a high level of *** security approach such as steganography en...
详细信息
Security systems are the need of the hour to protect data from unauthorized *** dissemination of confidential information over the public network requires a high level of *** security approach such as steganography ensures confidentiality,authentication,integrity,and *** helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and ***,we present an efficient hybrid security model that provides multifold security *** this end,a rectified Advanced Encryption Standard(AES)algorithm is proposed to overcome the problems existing in AES such as pattern appearance and high *** modified AES is used for the encryption of the stego image that contains the digitally signed encrypted secret *** enciphering and deciphering of the secret data are done using the Rivest–Shamir–Adleman(RSA)*** experiments are conducted on the images of the USC-SIPI standard image *** experimental results prove that the proposed hybrid system outperforms other SOTA(state-of-the-art)approaches.
The research volume increases at the study rate,causing massive text *** to these enormous text corpora,we are drowning in data and starving for ***,recent research employed different text mining approaches to extract...
详细信息
The research volume increases at the study rate,causing massive text *** to these enormous text corpora,we are drowning in data and starving for ***,recent research employed different text mining approaches to extract information from this text *** proposed approaches extract meaningful and precise phrases that effectively describe the text’s *** extracted phrases are commonly termed ***,these key phrases are employed to determine the different fields of study ***,these key phrases can also be used to determine the spatiotemporal trends in the various research *** this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend ***,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific *** study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research *** data was collected from various open access ***,this research determined the spatiotemporal trends using quality *** research also focused on finding the research collaboration of different countries in a particular research *** research collaborations of other countries’researchers show the impact on import and export of those *** visualization approach is also incorporated to understand the results better.
The integration of different learning paradigms has long been a focus of machine learning research, aimed at overcoming the inherent limitations of individual methods. Fuzzy rule-based models excel in interpretability...
详细信息
In the research under discussion, the authors put forth a novel approach to air quality monitoring in Ulaanbaatar, Mongolia’s capital, by leveraging the power of fog computing. This innovative method involves the col...
详细信息
In the research under discussion, the authors put forth a novel approach to air quality monitoring in Ulaanbaatar, Mongolia’s capital, by leveraging the power of fog computing. This innovative method involves the collection of air pollution data in a manner that is both cost-effective and efficient, thereby making it a viable solution for a city where air pollution is a significant concern. The primary objective of this approach is to estimate the impact of air pollution on public health. This is achieved through the application of statistical methods to the collected data, which allows for the understanding of the health risks associated with poor air quality. By doing so, it is hoped that this research will contribute to raising awareness about the dangers posed by air pollution, a problem that is often overlooked but has far-reaching implications for public health. One of the key features of the proposed approach is its focus on expanding the coverage of air quality monitoring. This is particularly relevant in the Ger areas of Ulaanbaatar, where pollution levels tend to spike during the winter months. The inhabitants of these areas, who often rely on coal for heating, are among the most affected by the adverse effects of air pollution. Therefore, by extending the reach of monitoring efforts to these areas, the research aims to provide a more accurate and comprehensive picture of the city’s air quality. In addition to the above, the research also takes into account the role of transportation in contributing to air pollution. In Ulaanbaatar, as in many other urban centers around the world, transportation is a one of major sources of air pollution. This includes not only public transport but also private vehicles, which collectively contribute a significant amount of pollutants to the city’s air. By considering the impact of transportation on air quality, the proposed approach acknowledges the multifaceted nature of the air pollution problem and underscores the need
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the *** learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and securit...
详细信息
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the *** learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security *** is crucial in offering a proactive security system in the field of *** real time,cybersecurity protects information,information systems,and networks from *** the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity *** an increasing rate,intruders are breaching information *** detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient *** have tried a variety of approaches to address the present cybersecurity obstacles and *** a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of *** projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems.
In our fast industrializing world, the need for more reliable and high-quality power production is highlighted by the growing need for electrical energy and the drive toward automation. In an effort to fulfill the gro...
详细信息
One of the most important subjects in statistics is the theory of estimation. In this paper, we consider the generalized Bayes shrinkage estimator of the mean vector for multivariate normal distribution with the unkno...
详细信息
The accelerated move toward adopting the Smart Grid paradigm has resulted in numerous drawbacks as far as security is concerned. Traditional power grids are becoming more vulnerable to cyberattacks as all the control ...
详细信息
This paper explores the potential of MultiModal Large Language Models (MM-LLMs) in automating grading processes in GUI design courses. We introduce a novel approach in using MM-LLMs to conduct pairwise comparisons rat...
详细信息
暂无评论