Addressing its growing number and vital role, decentralization of cloud computing becoming a necessity. Fog computing aims to bring application closer to the data source-typically at the network's edge by leveragi...
详细信息
This study presents a comprehensive comparative analysis of the effectiveness of word-level and character-level embeddings in the context of machine learning-based detection of malicious URLs and DGA-generated domains...
详细信息
The Internet of Things (IoT) can potentially change how humans interact with the environment. This technology is able to be applied in various fields, such as urban management, agriculture, environmental monitoring, h...
详细信息
Population-based metaheuristic algorithms have been used to solve challenging optimization problems, and numerous modifications to make these algorithms more efficient have been proposed. Jaya is one of these algorith...
详细信息
Typing errors are a behavior that often occurs in communication via short messages or posts on social media platforms. In communicating on social media, many individuals without realizing it often make typing errors t...
详细信息
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware *** an innovative fea...
详细信息
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware *** an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique(IFDRT),the authors have significantly reduced the feature space while retaining critical information necessary for malware *** technique optimizes the model’s performance and reduces computational *** proposed method is demonstrated by applying it to the BODMAS malware dataset,which contains 57,293 malware samples and 77,142 benign samples,each with a 2381-feature *** the IFDRT method,the dataset is transformed,reducing the number of features while maintaining essential data for accurate *** evaluation results show outstanding performance,with an F1 score of 0.984 and a high accuracy of 98.5%using only two reduced *** demonstrates the method’s ability to classify malware samples accurately while minimizing processing *** method allows for improving computational efficiency by reducing the feature space,which decreases the memory and time requirements for training and *** new method’s effectiveness is confirmed by the calculations,which indicate significant improvements in malware classification accuracy and *** research results enhance existing malware detection techniques and can be applied in various cybersecurity applications,including real-timemalware detection on resource-constrained *** and scientific contribution lie in the development of the IFDRT method,which provides a robust and efficient solution for feature reduction in ML-based malware classification,paving the way for more effective and scalable cybersecurity measures.
Indonesia has been participating at the International Olympiad in informatics (IOI) since 1995. The process of selecting the four contestants remains unchanged. All medalists in the national level competition were inv...
详细信息
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret...
详细信息
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoreticalmodels aim to study and analyze the strategic behaviors of individuals within a crowd and their interactionsduring the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. Thesemodels consider a group of individuals as homogeneous objects with the same goals, involve complex mathematicalformulation, and cannot model real-world scenarios such as panic, environmental information, crowds that movedynamically, etc. The proposed work presents a game theoretic model integrating an agent-based model to removethe obstacles from exits. The proposed model considered the parameters named: (1) obstacle size, length, andwidth, (2) removal time, (3) evacuation time, (4) crowd density, (5) obstacle identification, and (6) route *** proposed work conducts various experiments considering different conditions, such as obstacle types, obstacleremoval, and several obstacles. Evaluation results show the proposed model’s effectiveness compared with existingliterature in reducing the overall evacuation time, cell selection, and obstacle removal. The study is potentially usefulfor public safety situations such as emergency evacuations during disasters and calamities.
Tourist destination reviews on Google Maps have become a valuable point of reference for visitors seeking enjoyable spots to visit. Additionally, users can gain insight into the reasons for writing reviews. Text class...
详细信息
A location's Take-up Rate was significantly influenced by its Internet connectivity and availability. The purpose of this research is to answer concerns about internal Internet Service Provider issues that affect ...
详细信息
暂无评论