A budding technology that possesses an extensive range of potential applications comprising environmental monitoring, medical systems, smart spaces, along with robotic exploration is a wireless sensor network (WSN). M...
详细信息
Connecting multiple aerial vehicles to a rigid central platform through passive spherical joints holds the potential to construct a fully-actuated aerial platform. The integration of multiple vehicles enhances efficie...
详细信息
Malware represents the greatest threat to cybersecurity and serves as the weapon of choice for carrying out nefarious activities in the digital realm. The proliferation of malware poses significant risks to individual...
详细信息
Smartphones are compatible and easily accessible compared to computers irrespective of place and time. Smartphones merge with our routine which acts as a medium of communication in several ways such as messaging, voic...
详细信息
Efficient highway lighting is crucial for ensuring road safety and reducing energy consumption and costs. Traditional highway lighting systems rely on timers or simple photosensors, leading to inefficient operation by...
详细信息
Brain tumors are one of the deadliest diseases and require quick and accurate methods of detection. Finding the optimum image for research goals is the first step in optimizing MRI images for pre- and post-processing....
详细信息
Classification of malwares and viruses is a very important work in the cyber security field to protect the computers and systems from threats and attacks. In this paper, we proposed a novel approach for the classifica...
详细信息
The rapid adoption of online social media platforms has transformed the way of communication and *** these platforms,discussions in the form of trending topics provide a glimpse of events happening around the world in...
详细信息
The rapid adoption of online social media platforms has transformed the way of communication and *** these platforms,discussions in the form of trending topics provide a glimpse of events happening around the world in ***,these trends are used for political campaigns,public awareness,and brand ***,these trends are sensitive to manipulation by malicious users who aim to mislead the mass *** this article,we identify and study the characteristics of users involved in the manipulation of Twitter trends in *** propose“Manipify”-a framework for automatic detection and analysis of malicious users in Twitter *** framework consists of three distinct modules:(1)user classifier,(2)hashtag classifier,and(3)trend *** user classifier module introduces a novel approach to automatically detect manipulators using tweet content and user behaviour ***,the module classifies human and bot ***,the hashtag classifier categorizes trending hashtags into six categories assisting in examining manipulators behaviour across different ***,the trend analyzer module examines users,hashtags,and tweets for hashtag reach,linguistic features,and user *** user classifier module achieves 0.92 and 0.98 accuracy in classifying manipulators and bots,*** further test Manipify on the dataset comprising 652 trending hashtags with 5.4 million tweets and 1.9 million *** analysis of trends reveals that the trending panel is mostly dominated by political *** addition,our results show a higher contribution of human accounts in trend manipulation as compared to bots.
Railway accidents are an under-scrutinised cause of death in India. Train accidents are caused by various consequences of collisions, derailments, signal errors and so on. Furthermore, when train derailments become di...
详细信息
Parallel Disassembly Sequence Planning (DSP) deals with obtaining the order of disassembling the product with multiple parts disassembling simultaneously. Existing studies derive the product’s disassembly order based...
详细信息
暂无评论