Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus o...
详细信息
Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus on textual data, thus undermining the importance of metadata. Considering this gap, we provide a temporal pattern mining framework to model and utilize user-generated content's metadata. First, we scrap 2.1 million tweets from Twitter between Nov-2020 to Sep-2021 about 100 hashtag keywords and present these tweets into 100 User-Tweet-Hashtag (UTH) dynamic graphs. Second, we extract and identify four time-series in three timespans (Day, Hour, and Minute) from UTH dynamic graphs. Lastly, we model these four time-series with three machine learning algorithms to mine temporal patterns with the accuracy of 95.89%, 93.17%, 90.97%, and 93.73%, respectively. We demonstrate that user-generated content's metadata contains valuable information, which helps to understand the users' collective behavior and can be beneficial for business and research. Dataset and codes are publicly available;the link is given in the dataset section.
The SCADA systems in the Smart Grid Network (SGN) are increasingly facing cyber threats and divers attacks due to their known proprietary vulnerabilities, most often leading to power instability and cascading failures...
详细信息
With the development of artificial intelligence,the genetic algorithm has been widely used in many *** cryptography,the authors find it is natural to code an individual and design its fitness in a genetic algorithm fo...
详细信息
With the development of artificial intelligence,the genetic algorithm has been widely used in many *** cryptography,the authors find it is natural to code an individual and design its fitness in a genetic algorithm for a straightforward guess and determine analysis(SGDA,in short).Based on this observation,the authors propose an SGDA based on genetic *** it with the other three SGDAs based on exhaustive search,MILP method and CPP method respectively,the authors illustrate its effectiveness by three stream ciphers:Small scale SNOW 2.0,medium scale Enocoro-128v2 and large scale *** results show our method is significantly superior to them,especially for Trivium,the method can find a solution of 165 variables in less than one hour,while the other three methods are not applicable due to its enormous search space of size 2^(619.37).As far as we know,it is a best solution in an SGDA for Trivium so far.
Advancement and expansion of the internet, along with regular software upgrades, have generated many benefits in communication patterns. This rapid growth has also had a negative impact on the security of communicated...
详细信息
The busy-forbidden protocol is a new readers-writer lock with no resource contention between readers, which allows it to outperform other locks. For its verification, specifications of its implementation and its less ...
详细信息
In this paper, we propose a new entropy measure of Pythagorean fuzzy sets (PFSs). The proposed entropy measure of PFSs can conquer the shortcomings of the existing entropy measure of PFSs. We also propose the Pythagor...
详细信息
In recent years,the integration of stochastic techniques,especially those based on artificial neural networks,has emerged as a pivotal advancement in the field of computational fluid *** techniques offer a powerful fr...
详细信息
In recent years,the integration of stochastic techniques,especially those based on artificial neural networks,has emerged as a pivotal advancement in the field of computational fluid *** techniques offer a powerful framework for the analysis of complex fluid flow phenomena and address the uncertainties inherent in fluid dynamics *** this trend,the current investigation portrays the design and construction of an important technique named swarming optimized neuroheuristic intelligence with the competency of artificial neural networks to analyze nonlinear viscoelastic magneto-hydrodynamic Prandtl-Eyring fluid flow model,with diffusive magnetic layers effect along an extended *** currently designed computational technique is established using inverse multiquadric radial basis activation function through the hybridization of a well-known global searching technique of particle swarm optimization and sequential quadratic programming,a technique capable of rapid convergence *** most appropriate scaling group involved transformations that are implemented on governing equations of the suggested fluidic model to convert it from a system of nonlinear partial differential equations into a dimensionless form of a third-order nonlinear ordinary differential *** transformed/reduced fluid flow model is solved for sundry variations of physical quantities using the designed scheme and outcomes are matched consistently with Adam's numerical technique with negligible magnitude of absolute errors and mean square ***,it is revealed that the velocity of the fluid depreciates in the presence of a strong magnetic field *** efficacy of the designed solver is depicted evidently through rigorous statistical observations via exhaustive numerical experimentation of the fluidic problem.
The majority of current deepfake detection methods are constrained to identifying one or two specific types of counterfeit images,which limits their ability to keep pace with the rapid advancements in deepfake ***,in ...
详细信息
The majority of current deepfake detection methods are constrained to identifying one or two specific types of counterfeit images,which limits their ability to keep pace with the rapid advancements in deepfake ***,in this study,we propose a novel algorithm,StereoMixture Density Network(SMNDNet),which can detect multiple types of deepfake face manipulations using a single network *** is an end-to-end CNNbased network specially designed for detecting various manipulation types of deepfake face ***,we design a Subtle Distinguishable Feature Enhancement Module to emphasize the differentiation between authentic and forged ***,we introduce aMulti-Scale Forged Region AdaptiveModule that dynamically adapts to extract forged features from images of varying synthesis ***,we integrate a Nonlinear Expression Capability Enhancement Module to augment the model’s capacity for capturing intricate nonlinear patterns across various types of ***,these modules empower our model to efficiently extract forgery features fromdiverse manipulation types,ensuring a more satisfactory performance in multiple-types deepfake *** show that the proposed method outperforms alternative approaches in detection accuracy and AUC across all four types of deepfake *** also demonstrates strong generalization on cross-dataset and cross-type detection,along with robust performance against post-processing manipulations.
This paper proposes a new group decision making (GDM) approach in the environments of interval-valued intuitionistic fuzzy values (IVIFVs). Firstly, we propose a new score function of IVIFVs, where the proposed score ...
详细信息
Dynamic graphs serve as an abstract mathematical model applicable to various real-world scenarios, allowing the integration of complex temporal, structural, and relational patterns in data. To our knowledge, while muc...
详细信息
暂无评论