Machine Learning (ML) with 5G technology has revolutionized smart healthcare. It has helped improve the quality of care, such as real-time analysis, decision-making, patient monitoring, and personalized treatments. In...
详细信息
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap...
详细信息
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers(BERT)base model(cased),originally pretrained in *** model is uniquely adapted to recognize the intricate nuances of Arabic online communication,a key aspect often overlooked in conventional cyberbullying detection *** model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media(SM)tweets showing a notable increase in detection accuracy and sensitivity compared to existing *** results on a diverse Arabic dataset collected from the‘X platform’demonstrate a notable increase in detection accuracy and sensitivity compared to existing methods.E-BERT shows a substantial improvement in performance,evidenced by an accuracy of 98.45%,precision of 99.17%,recall of 99.10%,and an F1 score of 99.14%.The proposed E-BERT not only addresses a critical gap in cyberbullying detection in Arabic online forums but also sets a precedent for applying cross-lingual pretrained models in regional language applications,offering a scalable and effective framework for enhancing online safety across Arabic-speaking communities.
Breast Cancer Detection introduces a prominent confrontation for researchers and clinical experts as it is one of the major public health issues and is weighed as a leading root for cancer correlated deaths among wome...
详细信息
In recent years,the phenomenon of multistability has attracted wide *** this paper,a memristive chaotic system with extreme multistability is constructed by using a *** dynamic behavior of the system is analyzed by Po...
详细信息
In recent years,the phenomenon of multistability has attracted wide *** this paper,a memristive chaotic system with extreme multistability is constructed by using a *** dynamic behavior of the system is analyzed by Poincar´e mapping,a time series diagram,and a bifurcation *** results show that the new system has several significant ***,the new system has a constant Lyapunov exponent,transient chaos and one complete Feigenbaum ***,the system has the phenomenon of bifurcation map shifts that depend on the initial *** addition,we find periodic bursting oscillations,chaotic bursting oscillations,and the transition of chaotic bursting oscillations to periodic bursting *** particular,when the system parameters take different discrete values,the system generates a bubble phenomenon that varies with the initial conditions,and this bubble can be shifted with the initial values,which has rarely been seen in the previous *** implementation by field-programmable gate array(FPGA)and analog circuit simulation show close alignment with the MATLAB numerical simulation results,validating the system’s ***,the image encryption algorithm integrating DNA-based encoding and chaotic systems further demonstrates its practical applicability.
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicated on 2D compressed sensing(CS)and the hyperchaotic ***,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong ***,the processed images are con-currently encrypted and compressed using 2D *** them,chaotic sequences replace traditional random measurement matrices to increase the system’s ***,the processed images are re-encrypted using a combination of permutation and diffusion *** addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct *** with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational ***,it has better *** experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
Deep learning offers a promising methodology for the registration of prostate cancer images from histopathology to MRI. We explored how to effectively leverage key information from images to achieve improved end-to-en...
详细信息
Decentralized Anonymous Payment systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
In this Letter, a diffractive deep neural network (DDNN) optical system has been proposed to implement a discrete fractional Fourier transform (DFrFT). By optimizing the phase distributions of the successive diffracti...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified o...
Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified only in the first *** most tracking algorithms have facilitated significant advances in RGB video sequences, object tracking using only RGB information is unreliable under extreme lighting conditions(e.g., dark night, rain, and foggy).
暂无评论