We consider random simple temporal graphs in which every edge of the complete graph Kn appears once within the time interval [0, 1] independently and uniformly at random. Our main result is a sharp threshold on the si...
详细信息
In the modern world, life expectancy turns out to be the most valuable factor in determining population's health. Today, it is more crucial to predict the future because life is more precarious due to a variety of...
详细信息
Multi-view clustering is an important machine learning task for multi-media data, encompassing various domains such as images, videos, and texts. Moreover, with the growing abundance of graph data, the significance of...
详细信息
Autonomous navigation in Unmanned Aerial Vehicles (UAVs) is a crucial and rapidly advancing field with a wide range of applications. It utilizes various deep learning (DL) algorithms that enable UAVs to operate and na...
详细信息
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper pro...
详细信息
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization(PSO)to address the risks associated with IoT *** logic addresses IoT threat uncertainties and ambiguities *** component settings are optimized using PSO to improve *** methodology allows for more complex thinking by transitioning from binary to continuous *** of expert inputs,PSO data-driven tunes rules and membership *** study presents a complete IoT botnet risk assessment *** methodology helps security teams allocate resources by categorizing threats as high,medium,or low *** study shows how CICIoT2023 can assess cyber *** research has implications beyond detection,as it provides a proactive approach to risk management and promotes the development of more secure IoT environments.
This research study presents a comprehensive survey of Natural Language Processing (NLP) research, tracing its historical evolution from its inception to the present. The survey explores the key milestones and advance...
详细信息
The global digitization of most activities of corporate and non-corporate bodies has come to stay. The interconnection of physical object "things"embedded with different technologies such as sensors, softwar...
详细信息
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
The random subspace method is an ensemble learning technique of great potential. However, its popularity does not match its potential because of its prohibitive cost and the lack of plug-and-play reusable modules. To ...
详细信息
暂无评论