ICT is widely adopted by Asian youth and is utilized by people of all ages across the continent. Despite its many advantages, unethical ICT usage can lead to many complications. A harmful application of ICT for social...
详细信息
ICT is widely adopted by Asian youth and is utilized by people of all ages across the continent. Despite its many advantages, unethical ICT usage can lead to many complications. A harmful application of ICT for social communication and engagement is cyberbullying. Simply adhering to the generally accepted norms and guidelines for cybersecurity will not protect you from cybercrime. Even well-known social media stages like Twitter are safe from this attack. Natural language processing (NLP) research on cyberbullying detection has become popular recently. Even though old-style NLP procedures have become highly cyberbullying, there are still hurdles to overcome. These include the limited character count allowed by social media platforms, an imbalance among comments, ambiguity, and unnecessary use of slang. Models based on (CNNs), Multilayer Perceptrons (MLPs), and (RNNs), have recently shown encouraging results in a variety of NLP tasks. With this motivation, this research develops an African vulture optimization algorithm with a graph neural network-based cyberbullying detection and classification (AVOAGNN-CBDC) model. The proposed AVOAGNN-CBDC technique mainly intends to detect and classify cyberbullying. The AVOAGNN-CBDC technique undergoes data preprocessing in different stages and a FastText-based word embedding process to achieve this. Besides, the AVOAGNN-CBDC technique employs the GNN model for cyberbullying detection and classification. Finally, the AVOA is used for the optimal parameter selection of the GNN model, which helps achieve improved classification performance. The experimental result investigation of the AVOAGNN-CBDC technique is tested on the cyberbullying dataset, and the outcomes highlighted the supremacy of the AVOAGNN-CBDC technique in terms of several measures.
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and...
详细信息
ISBN:
(数字)9781468474046
ISBN:
(纸本)9781850912538
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and increasingly via drawing software and computer-aided design (CAD), recently, robots have even started invading work sites. What are the main trends of CAD and robotics in the field of architecture and civil enginee ring? What type of R&D effort do university and industrial laboratories undertake to devise the professional software that will be on the market in the next three to five years? These are the issues which will be addressed during this symposium. To this effect, we have planned concurrently an equipment and software show, as well as a twofold conference. Robotic is just starting in the field of civil engineering and construction. A pioneer, the Civil Engineering Departement of Carnegie-Mellon University, in the United States, organized the first two international symposia, in 1984 and 1985 in Pittsburgh. This is the third meeting on the subject (this year, however, we have also included CAD). It constitutes the first large international symposium where CAD experts, specialists in architecture and CEC robotics will meet. From this standpoint, it should be an ideal forum for exchanging views and expe riences on a wide range of topics, and we hope it will give rise to novel applications and new syntheses. This symposium is intented for scientists, teachers, students and also for manufacturers and all CEC professionals.
This volume contains research papers that were presented at the Sixth Eurographics Workshop on Animation and Simulation which took place at Maastricht, The Nether lands, September 2-3, 1995. A core area within c...
详细信息
ISBN:
(数字)9783709194355
ISBN:
(纸本)9783211827383
This volume contains research papers that were presented at the Sixth Eurographics Workshop on Animation and Simulation which took place at Maastricht, The Nether lands, September 2-3, 1995. A core area within computergraphics, animation is concerned with the computer synthesis of dynamic scenes. The creation of realistic animation based on the simulation of physical and biological phenomena is a unify ing and rapidly evolving research theme. This series of workshops, an activity of the Eurographics Working Group on Animation and Simulation, is an international forum where researchers representing the animation and simulation communities convene to exchange knowledge and experience related to this theme and to physics-based mod elling, human modelling, motion control, visualization, etc. Of keen interest at this sixth workshop were novel animation techniques and animation systems that simulate the dynamics and interactions of physical objects-solid, fluid, and gaseous-as well as the behaviors of living systems such as plants, lower animals, and humans. The workshop continued to promote the confluence of animation and simulation as a leading edge of computergraphics research that is providing animators with sophisticated new algorithms for synthesizing dynamic scenes. The call for extended abstracts for the workshop, issued in February 1995, elicited an enthusiastic response.
This book highlights a collection of high-quality peer-reviewed research papers presented at the Sixth International Conference on Information System Design and Intelligent Applications (INDIA 2019), held at Lendi Ins...
详细信息
ISBN:
(数字)9789811553974
ISBN:
(纸本)9789811553967
This book highlights a collection of high-quality peer-reviewed research papers presented at the Sixth International Conference on Information System Design and Intelligent Applications (INDIA 2019), held at Lendi Institute of Engineering & technology, Vizianagaram, Andhra Pradesh, India, from 1 to 2 November 2019. It covers a wide range of topics in computerscience and information technology, from wireless networks, social networks, wireless sensor networks, information and network security, to web security, Internet of Things, bioinformatics, geoinformatics and computer networks.
Advances in computing and communications have brought about an increasing demand for visual information.;addresses the principles behind "visual technology", and provides readers with a good understanding of...
详细信息
ISBN:
(数字)9783642850233
ISBN:
(纸本)9783642850257
Advances in computing and communications have brought about an increasing demand for visual information.;addresses the principles behind "visual technology", and provides readers with a good understanding of how the integration of computergraphics, Visual Perception and Imaging is achieved.;Included in the book is an overview of important research areas within this integration which will be useful for further work in the field. Foundations of visual perception and psychophysics are presented as well as basic methods of imaging and computer vision.;This book serves as an excellent reference and textbook for those who wish to apply or study "visual computing technology."
The agriculture is the backbone of economic system, and it plays an essential part in the survival of a nation’s prosperity. In addition to providing raw materials and food, it also offers numerous employment opportu...
详细信息
The agriculture is the backbone of economic system, and it plays an essential part in the survival of a nation’s prosperity. In addition to providing raw materials and food, it also offers numerous employment opportunities. Consequently, agriculture necessitates modern technology to increase productivity. In these circumstances, Wireless Sensor Networks (WSNs) are used to detect climatic parameters like light, humidity, carbon dioxide, acidity, soil moisture, and temperature in an agricultural field. However, the research that is being done at the moment is unable to circumvent the issue that safety and effectiveness cannot coexist. Several studies employ time-consuming cryptographic security structures, whereas the majority of lightweight systems are designed without reviewing certain security aspects like resistance to ephemeral secret leakage (ESL) attacks, perfect forward secrecy, and so on. According to our opinion, this issue may be overcome through the use of lightweight cryptographic primitives, paying particular attention to protocol weaknesses, and keeping in mind the ever-changing security needs of individuals. We present an extensive lightweight three-factor authentication protocol with diverse security criteria, along with the adaptive privacy preservation, that is suited for user-friendly situation in the WSN enviroment. This is accomplished by removing all extraneous cryptographic structures. It has been illustrated that proposed protocol is much better in terms of the privacy and security aspects via the usage of security aspects, proof of the real-or-random (ROR) model, protocols of internet security, and applications that are subjected to experimental validation utilizing automated validation. and comparison with other protocols’ security aspects. The performance analysis shows how superior our proposed protocol is to other competing protocols in terms of communication and computational overheads, with respective efficiencies of 53% and 39%. Moreov
With the rapid development of smart device technology, the current version of the Internet of Things (IoT) is moving towards a multimedia IoT because of multimedia data. This innovative concept seamlessly integrates m...
详细信息
With the rapid development of smart device technology, the current version of the Internet of Things (IoT) is moving towards a multimedia IoT because of multimedia data. This innovative concept seamlessly integrates multimedia data with the IoT-Edge Continuum. Recently, a distributed learning framework shows promise in revolutionizing various industries, including smart cities, healthcare, etc. However, these applications may face challenges such as the presence of malicious devices that invade the privacy of other devices or corrupt uploaded model parameters. Additionally, the existing synchronous federated learning (FL) methods face challenges in effectively training models on local datasets due to the diversity of IoT devices. To tackle these concerns, we propose an efficient and privacy-enhanced asynchronous federated learning approach for multimedia data in edge-based IoT. In contrast to traditional FL methods, our approach combines revocable attribute-based encryption (RABE) and differential privacy (DP). This guarantees the privacy of the entire process while allowing seamless collaboration between multiple devices and the aggregation server during model training. Also, this combination brings a dynamic nature to the system. Furthermore, we utilize an asynchronous weight-based aggregation algorithm to improve the efficiency of training and the quality of the final returned model. Our proposed scheme is confirmed by theoretical safety proofs and experimental results with multimedia data. Performance evaluation shows that our framework reduces the cryptography runtime by 63.3% and the global model aggregation time by 61.9% compared to cutting-edge schemes. Moreover, our accuracy is comparable to the most primitive FL schemes, maintaining 86.7%, 70.8%, and 86.1% on MNIST, CIFAR-10, and Fashion-MNIST, respectively. The experimental results highlight the remarkable practicality, resilience and effectiveness of the proposed scheme.
暂无评论