With the increasing complexity of datasets in reality, it is difficult to obtain instances with full labels, resulting in weak label problems. The existing methods are mainly based on the low rank and instance manifol...
详细信息
Due to the residual stress, asymmetric cross-ply bi-stable laminates can show two different stable deformation states at room temperature. In this paper, the stable configurations and snap through nonlinear vibration ...
详细信息
In order to enhance the network throughput for modern fiber optic networks, disruptive capacity-expanding technologies are emerging, such as spatial division multiplexing or adding L-band transmission, at the cost of ...
详细信息
A decision-making model for intelligent agents is proposed in this study, emphasizing the maximization of group utility to address the challenges of multi-agent decision-making in dynamic and partially observable envi...
详细信息
Heart disease is one of the destructive infections that an enormous populace of individuals all over the planet grieves. The prediction of heart disease is very much urged because of increasing death rates. The conven...
详细信息
This paper presents a gamified virtual cybersecurity training platform, which aims to control the potential risk of cybersecurity training through virtualization technology, increase the interaction of the training pr...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in *** the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the *** this background,there is a drastic increase observed in the number of phishing emails sent to potential *** scenario necessitates the importance of designing an effective classification *** numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the *** current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)*** aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing *** the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word ***,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature ***,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing ***,the CS algorithm is used to fine-tune the parameters involved in the GRU *** performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several *** comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing *** proposed model achieved a maximum accuracy of 99.72%.
Unmanned Aerial Vehicle(UAV)can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks(WSNs),which is crucial for providing seamless services and improvin...
详细信息
Unmanned Aerial Vehicle(UAV)can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks(WSNs),which is crucial for providing seamless services and improving the performance in the next generation wireless ***,since the UAV are powered by batteries with limited energy capacity,the UAV cannot complete data collection tasks of all sensors without energy replenishment when a large number of sensors are deployed over large monitoring *** overcome this problem,we study the Real-time Data Collection with Lasercharging UAV(RDCL)problem,where the UAV is utilized to collect data from a specified WSN and is recharged using Laser Beam Directors(LBDs).This problem aims to collect all sensory data from the WSN and transport it to the base station by optimizing the flight trajectory of UAV such that realtime data performance is ensured It has been proven that the RDCL problem is *** address this,we initially focus on studying two sub-problems,the Trajectory Optimization of UAV for Data Collection(TODC)problem and the Charging Trajectory Optimization of UAV(CTO)problem,whose objectives are to find the optimal flight plans of UAV in the data collection areas and charging areas,*** we propose an approximation algorithm to solve each of them with the constant ***,we present an approximation algorithm that utilizes the solutions obtained from TODC and CTO problems to address the RDCL ***,the proposed algorithm is verified by extensive simulations.
The mining of heterogeneous distributed data is a key technology for insight data traceability and classification feature analysis. A heterogeneous distributed data mining method based on decision tree classification ...
详细信息
Private set intersection (PSI) is an important cryptographic primitive with many real-world applications. Delegating PSI computation to the cloud can effectively reduce management and computational costs of data owner...
详细信息
暂无评论