High-utility item-set mining has become a very crucial topic of research in recent times. It is used to find profitable products utilizing both profit factors and the quantity as opposed to the association rule mining...
详细信息
High-utility item-set mining has become a very crucial topic of research in recent times. It is used to find profitable products utilizing both profit factors and the quantity as opposed to the association rule mining or the frequent item-set mining. There are many algorithms that are proposed for mining, such high-utility item-sets, and almost all algorithms will need to grip an exponential search space for learning the high-utility item-sets. To handle the exponential search space, metaheuristic algorithms are used to find optimal solutions. Here, an optimization method depending on the grey wolf optimization and dolphin echolocation-optimization has been proposed for finding high-utility item-sets. The grey wolf optimization algorithm can be an interesting one owing to the strategy of group foraging. All conventional grey wolf optimization will deal with the problems of continuous optimization. In dolphin echolocation-optimization, as soon as the dolphin manages to reach the food, the search is reduced, and there is an increasing click made that directs food to the site where food is. The procedure also feigns dolphin echolocation by means of preventive exploration, and this is relational its target distance. In connection to the problems in optimization, there can be a particular features-set, which include progress of various hunting preys that sing echo sounding among dolphins, those having problems in answering. A hybrid dolphin echolocation-optimization (hybrid dolphin echolocation-binary grey wolf optimization) is proposed with a novel mechanism for finding global solutions. In this work, hybrid dolphin echolocation-binary grey wolf optimization algorithm is proposed. The dolphin echolocation-optimization had taken as it can be a promising solution and the Boolean format of grey wolf optimization is used. It works as a global search solution to distinguish the high-utility item-sets. The results prove that the dolphin echolocation-binary grey wolf optimizat
To design a Java processor with traditional modern processor architecture, the Instruction Level Parallelism (ILP) is not readily exploitable due to stack operands dependencies. This paper presents a dataflow-based in...
详细信息
Energy Internet (EI) has drawn increasingly interests in related industries. The implement of EI is a milestone on the road-map to promote the revolution of both energy production and consumption, which is important t...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device *** home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical *** paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in *** have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT *** system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing *** have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache *** feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time *** is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation ***,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber *** trial results support the proposed system and demonstrate its potential for use in everyday life.
Data-intensive e-science applications often rely on third-party data found in public repositories, whose quality is largely unknown. Although scientists are aware that this uncertainty may lead to incorrect scientific...
详细信息
ISBN:
(纸本)1595936866
Data-intensive e-science applications often rely on third-party data found in public repositories, whose quality is largely unknown. Although scientists are aware that this uncertainty may lead to incorrect scientific conclusions, in the absence of a quantitative characterization of data quality properties they find it difficult to formulate precise data acceptability criteria. We present an Information Quality management workbench, called Qurator, that supports data experts in the specification of personal quality models, and lets them derive effective criteria for data acceptability. The demo of our working prototype will illustrate our approach on a real e-science workflow for a bioinformatics application.
For many object detection methods, occlusion is a challenge problem and researchers have been spending a lot of time on solving it. Recently, by using synthetic aperture imaging with a camera array the occluded object...
详细信息
Cloud computing services and gig economy platforms vary in flexibility, efficiency, and scalability due to their pricing schemes. Cloud computing services provide flexibility and cost control via pay-as-you-go, subscr...
详细信息
Introducing the P2P (Peer-to-Peer) technology into SIP (Session Initiation Protocol) networks can improve VoIP (Voice on Internet Protocol) system's reliability and scalability, and reduce the operating costs. In ...
详细信息
In today's digital landscape, we need to pay significant attention to identifying flaws in web-based applications. Most online applications use browsers to access data that belongs to web-based applications. The v...
详细信息
ISBN:
(纸本)9798350348637
In today's digital landscape, we need to pay significant attention to identifying flaws in web-based applications. Most online applications use browsers to access data that belongs to web-based applications. The victim industry and industry losses increase in the perspective of SQL injection attacks. at the same time, the software market size has increased from 2019 to 2023, as the number of SQL injection attacks has grown in the same years. Many database-driven websites work in the market, and there is no mechanism to block another input, and there is a longer chance of injecting malicious SQL code into the database. The hackers injected through string commands and functions of SQL (Structure Query Language) due to the dynamic disregard of this command in the runtime. The security community has developed several methods for detecting software vulnerabilities, such as supervised, semi-supervised, deep learning, and machine learning. Given our literature, successful and effective vulnerability identification models require for the users. OWASP has the top 10-2021 vulnerabilities, as the numbers 07 and 08 were significant code injection attacks found in our literature review as critical, and 20% of detection models work in the software industry on machine Learning basis. The review's findings demonstrated that studies create new SQL injection attack datasets using machine learning techniques and *** proposed model is working on a machine learning basis to identify two vulnerabilities of OWASP's top-ten 2021 No: 7 and 8: (1) identification and authentication failures and (2) software and data integrity failures. Both vulnerabilities are related to SQL injection. Further, this model works as a tool for identifying vulnerabilities in input data in the runtime. Support Vector Machine (SVM), K-nearest neighbours Random Forest (RF) and Random Forest (RF). RF provides higher accuracy due to its feature extraction and classification process and trained for classificatio
Most of the existing work on skyline query has been extensively used in decision support, recommending systems etc, and mainly focuses on the efficiency issue for a single table. However the data retrieved by users fo...
详细信息
暂无评论