Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ...
详细信息
Due to some factors such as optical aberrations and large parallax, a few stitching methods lead to artifacts and distortions in the panoramic image. To alleviate this issue, this paper proposes a robust unmanned aeri...
详细信息
This paper introduces the African Bison Optimization(ABO)algorithm,which is based on biological *** is inspired by the survival behaviors of the African bison,including foraging,bathing,jousting,mating,and *** foragin...
详细信息
This paper introduces the African Bison Optimization(ABO)algorithm,which is based on biological *** is inspired by the survival behaviors of the African bison,including foraging,bathing,jousting,mating,and *** foraging behavior prompts the bison to seek a richer food source for *** bison find a food source,they stick around for a while by bathing *** jousting behavior makes bison stand out in the population,then the winner gets the chance to produce offspring in the mating *** eliminating behavior causes the old or injured bison to be weeded out from the herd,thus maintaining the excellent *** above behaviors are translated into ABO by mathematical *** assess the reliability and performance of ABO,it is evaluated on a diverse set of 23 benchmark functions and applied to solve five practical engineering problems with *** findings from the simulation demonstrate that ABO exhibits superior and more competitive performance by effectively managing the trade-off between exploration and exploitation when compared with the other nine popular metaheuristics algorithms.
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic de...
详细信息
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic demand to develop an efficient intrusion detection algorithm for connected *** of existing intrusion detection methods are trained in a centralized manner and are incapable to identify new unlabeled attack *** this paper,a distributed federated intrusion detection method is proposed,utilizing the information contained in the labeled data as the prior knowledge to discover new unlabeled attack ***,the blockchain technique is introduced in the federated learning process for the consensus of the entire *** results are provided to show that our approach can identify the malicious entities,while outperforming the existing methods in discovering new intrusion attack types.
Genetic programming hyperheuristic (GPHH) has recently become a promising methodology for large-scale dynamic path planning (LDPP) since it can produce reusable heuristics rather than disposable solutions. However, in...
详细信息
1 Introduction Graphical User Interface(GUI)widgets classification entails classifying widgets into their appropriate domain-specific types(e.g.,CheckBox and EditText)[1,2].The widgets classification is essential as i...
详细信息
1 Introduction Graphical User Interface(GUI)widgets classification entails classifying widgets into their appropriate domain-specific types(e.g.,CheckBox and EditText)[1,2].The widgets classification is essential as it supports several software engineering tasks,such as GUI design and testing[1,3].The ability to obtain better widget classification performance has become one of the keys to the success of these *** in recent years have proposed many techniques for improving widget classification performance[1,2,4].For example,Moran et al.[1]proposed a deep learning technique to classify GUI widgets into their domain-specific *** authors used the deep learning algorithm,a Convolutional Neural Network(CNN)architecture,to classify the GUI *** et al.[2]proposed combining text-based and non-text-based models to improve the overall performance of GUI widget detection while classifying the widgets with the ResNet50 model.
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
Vision-based depression estimation is an emerging yet impactful task, whose challenge lies in predicting the severity of depression from facial videos lasting at least several minutes. Existing methods primarily focus...
详细信息
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu...
详细信息
Traffic conflict techniques rely heavily on the proper identification of conflict extremes,which directly affects the prediction performance of extreme value *** sampling techniques,namely,block maxima and peak over t...
详细信息
Traffic conflict techniques rely heavily on the proper identification of conflict extremes,which directly affects the prediction performance of extreme value *** sampling techniques,namely,block maxima and peak over threshold,form the core of these *** studies have demonstrated the inefficacy of extreme value models based on these sampling approaches,as their crash estimates are too imprecise,hindering their widespread practical ***,anomaly detection techniques for sampling conflict extremes have been used,but their application has been limited to estimating crash frequency without considering the crash severity *** address this research gap,this study proposes a hybrid model of machine learning and extreme value theory within a bivariate framework of traffic conflict measures to estimate crash frequency by severity *** particular,modified time-to-collision(MTTC)and expected post-collision change in velocity(Delta-V orΔV)have been proposed in the hybrid modeling framework to estimate rear-end crash frequency by severity ***-end conflicts were identified through artificial intelligence-based video analytics for three four-legged signalized intersections in Brisbane,Australia,using four days of ***-stationary bivariate hybrid generalized extreme value models with different anomaly detection/sampling techniques(isolation forest and minimum covariance determinant)were *** non-stationarity of traffic conflict extremes was handled by parameterizing model parameters,including location,scale,and both location and scale parameters *** results indicate that the bivariate hybrid models can estimate severe and non-severe crashes when compared with historical crash records,thereby demonstrating the viability of the proposed approach.A comparative analysis of two anomaly techniques reveals that the isolation forest model marginally outperforms the minimum covariance determinant ***,the modeling f
暂无评论