Responding to complex analytical queries in the data warehouse(DW)is one of the most challenging tasks that require prompt attention.The problem of materialized view(MV)selection relies on selecting the most optimal v...Responding to complex analytical queries in the data warehouse(DW)is one of the most challenging tasks that require prompt attention.The problem of materialized view(MV)selection relies on selecting the most optimal views that can respond to more queries simultaneously.This work introduces a combined approach in which the constraint handling process is combined with metaheuristics to select the most optimal subset of DW views from DWs.The proposed work initially refines the solution to enable a feasible selection of views using the ensemble constraint handling technique(ECHT).The constraints such as self-adaptive penalty,epsilon(ε)-parameter and stochastic ranking(SR)are considered for constraint handling.These two constraints helped the proposed model select the finest views that minimize the objective function.Further,a novel and effective combination of Ebola and coot optimization algorithms named hybrid Ebola with coot optimization(CHECO)is introduced to choose the optimal MVs.Ebola and Coot have recently introduced metaheuristics that identify the global optimal set of views from the given population.By combining these two algorithms,the proposed framework resulted in a highly optimized set of views with minimized costs.Several cost functions are described to enable the algorithm to choose the finest solution from the problem space.Finally,extensive evaluations are conducted to prove the performance of the proposed approach compared to existing algorithms.The proposed framework resulted in a view maintenance cost of 6,329,354,613,784,query processing cost of 3,522,857,483,566 and execution time of 226 s when analyzed using the TPC-H benchmark dataset.展开更多
Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.D...Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.Due to its instability in usage and the fact that numerous nodes communicate data concur-rently,adequate channel and forwarder selection is essential.In this proposed design for a Cognitive Radio Cognitive Network(CRCN),we gain the confidence of each forwarding node by contacting one-hop and second level nodes,obtaining reports from them,and selecting the forwarder appropriately with the use of an optimization technique.At that point,we concentrate our efforts on their channel,selection,and lastly,the transmission of data packets via the designated forwarder.The simulation work is validated in this section using the MATLAB program.Additionally,steps show how the node acts as a confident forwarder and shares the channel in a compatible method to communicate,allowing for more packet bits to be transmitted by conveniently picking the channel between them.We cal-culate the confidence of the node at the start of the network by combining the reliability report for thefirst hop and the reliability report for the secondary hop.We then refer to the same node as the confident node in order to operate as a forwarder.As a result,we witness an increase in the leftover energy in the output.The percentage of data packets delivered has also increased.展开更多
Camouflaged people are extremely expert in actively concealing themselves by effectively utilizing cover and the surrounding environment. Despite advancements in optical detection capabilities through imaging systems,...Camouflaged people are extremely expert in actively concealing themselves by effectively utilizing cover and the surrounding environment. Despite advancements in optical detection capabilities through imaging systems, including spectral, polarization, and infrared technologies, there is still a lack of effective real-time method for accurately detecting small-size and high-efficient camouflaged people in complex real-world scenes. Here, this study proposes a snapshot multispectral image-based camouflaged detection model, multispectral YOLO(MS-YOLO), which utilizes the SPD-Conv and Sim AM modules to effectively represent targets and suppress background interference by exploiting the spatial-spectral target information. Besides, the study constructs the first real-shot multispectral camouflaged people dataset(MSCPD), which encompasses diverse scenes, target scales, and attitudes. To minimize information redundancy, MS-YOLO selects an optimal subset of 12 bands with strong feature representation and minimal inter-band correlation as input. Through experiments on the MSCPD, MS-YOLO achieves a mean Average Precision of 94.31% and real-time detection at 65 frames per second, which confirms the effectiveness and efficiency of our method in detecting camouflaged people in various typical desert and forest scenes. Our approach offers valuable support to improve the perception capabilities of unmanned aerial vehicles in detecting enemy forces and rescuing personnel in battlefield.展开更多
Accurate multi-source fusion is based on the reliability, quantity, and fusion mode of the sources. The problem of selecting the optimal set for participating in the fusion process is nondeterministic-polynomial-time-...Accurate multi-source fusion is based on the reliability, quantity, and fusion mode of the sources. The problem of selecting the optimal set for participating in the fusion process is nondeterministic-polynomial-time-hard and is neither sub-modular nor super-modular. Furthermore, in the case of the Kalman filter(KF) fusion algorithm, accurate statistical characteristics of noise are difficult to obtain, and this leads to an unsatisfactory fusion result. To settle the referred cases, a distributed and adaptive weighted fusion algorithm based on KF has been proposed in this paper. In this method, on the basis of the pseudo prior probability of the estimated state of each source, the reliability of the sources is evaluated and the optimal set is selected on a certain threshold. Experiments were performed on multi-source pedestrian dead reckoning for verifying the proposed algorithm. The results obtained from these experiments indicate that the optimal set can be selected accurately with minimal computation, and the fusion error is reduced by 16.6% as compared to the corresponding value resulting from the algorithm without improvements.The proposed adaptive source reliability and fusion weight evaluation is effective against the varied-noise multi-source fusion system, and the fusion error caused by inaccurate statistical characteristics of the noise is reduced by the adaptive weight evaluation.The proposed algorithm exhibits good robustness, adaptability,and value on applications.展开更多
Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography...Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process(OPSP)acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarmoptimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.展开更多
Selecting the optimal one from similar schemes is a paramount work in equipment design.In consideration of similarity of schemes and repetition of characteristic indices,the theory of set pair analysis(SPA)is proposed...Selecting the optimal one from similar schemes is a paramount work in equipment design.In consideration of similarity of schemes and repetition of characteristic indices,the theory of set pair analysis(SPA)is proposed,and then an optimal selection model is established.In order to improve the accuracy and flexibility,the model is modified by the contribution degree.At last,this model has been validated by an example,and the result demonstrates the method is feasible and valuable for practical usage.展开更多
As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attacke...As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward.展开更多
A spectral match optimization based on grey incidence matrix was put forward to evaluate camouflage painting design.A synthetic degree of incidence (SDI) was defined to comprehensively reflect the spectrum similarity ...A spectral match optimization based on grey incidence matrix was put forward to evaluate camouflage painting design.A synthetic degree of incidence (SDI) was defined to comprehensively reflect the spectrum similarity based on theory of grey incidence analysis.A grey optimization model for camouflage painting sheme was constructed on the basis of SDI and grey incidence matrix.Its weight values were determined according to area percentages of all components in the camouflage scene,and a quantitative ordering for various schemes could be obtained according to the evaluation coefficients.Experiment results show that the method mentioned in this paper can provide a quantitative basis for the camouflage decision-making,and it can also be used in other camouflage scheme selection.展开更多
The tendency toward achieving more sustainable and green buildings turned several passive buildings into more dynamic ones.Mosques are the type of buildings that have a unique energy usage pattern.Nevertheless,these t...The tendency toward achieving more sustainable and green buildings turned several passive buildings into more dynamic ones.Mosques are the type of buildings that have a unique energy usage pattern.Nevertheless,these types of buildings have minimal consideration in the ongoing energy efficiency applications.This is due to the unpredictability in the electrical consumption of the mosques affecting the stability of the distribution networks.Therefore,this study addresses this issue by developing a framework for a short-term electricity load forecast for a mosque load located in Riyadh,Saudi Arabia.In this study,and by harvesting the load consumption of the mosque and meteorological datasets,the performance of four forecasting algorithms is investigated,namely Artificial Neural Network and Support Vector Regression(SVR)based on three kernel functions:Radial Basis(RB),Polynomial,and Linear.In addition,this research work examines the impact of 13 different combinations of input attributes since selecting the optimal features has a major influence on yielding precise forecasting outcomes.For the mosque load,the(SVR-RB)with eleven features appeared to be the best forecasting model with the lowest forecasting errors metrics giving RMSE,nRMSE,MAE,and nMAE values of 4.207 kW,2.522%,2.938 kW,and 1.761%,respectively.展开更多
A groundbreaking method is introduced to leverage machine learn-ing algorithms to revolutionize the prediction of success rates for science fiction films.In the captivating world of the film industry,extensive researc...A groundbreaking method is introduced to leverage machine learn-ing algorithms to revolutionize the prediction of success rates for science fiction films.In the captivating world of the film industry,extensive research and accurate forecasting are vital to anticipating a movie’s triumph prior to its debut.Our study aims to harness the power of available data to estimate a film’s early success rate.With the vast resources offered by the internet,we can access a plethora of movie-related information,including actors,directors,critic reviews,user reviews,ratings,writers,budgets,genres,Facebook likes,YouTube views for movie trailers,and Twitter followers.The first few weeks of a film’s release are crucial in determining its fate,and online reviews and film evaluations profoundly impact its opening-week earnings.Hence,our research employs advanced supervised machine learning techniques to predict a film’s triumph.The Internet Movie Database(IMDb)is a comprehensive data repository for nearly all movies.A robust predictive classification approach is developed by employing various machine learning algorithms,such as fine,medium,coarse,cosine,cubic,and weighted KNN.To determine the best model,the performance of each feature was evaluated based on composite metrics.Moreover,the significant influences of social media platforms were recognized including Twitter,Instagram,and Facebook on shaping individuals’opinions.A hybrid success rating prediction model is obtained by integrating the proposed prediction models with sentiment analysis from available platforms.The findings of this study demonstrate that the chosen algorithms offer more precise estimations,faster execution times,and higher accuracy rates when compared to previous research.By integrating the features of existing prediction models and social media sentiment analysis models,our proposed approach provides a remarkably accurate prediction of a movie’s success.This breakthrough can help movie producers and marketers anticipate a film’s triumph before its release,allowing them to tailor their promotional activities accordingly.Furthermore,the adopted research lays the foundation for developing even more accurate prediction models,considering the ever-increasing significance of social media platforms in shaping individ-uals’opinions.In conclusion,this study showcases the immense potential of machine learning algorithms in predicting the success rate of science fiction films,opening new avenues for the film industry.展开更多
Recent estimates indicate that one-fifth of botanical species worldwide are considered at risk of becoming extinct in the wild. One available strategy for conserving many rare plant species is reintroduction, which ho...Recent estimates indicate that one-fifth of botanical species worldwide are considered at risk of becoming extinct in the wild. One available strategy for conserving many rare plant species is reintroduction, which holds much promise especially when carefully planned by following guidelines and when monitored long-term. We review the Center for Plant Conservation Best Reintroduction Practice Guidelines and highlight important components for planning plant reintroductions. Before attempting reintroductions practitioners should justify them, should consider alternative conservation strategies, understand threats, and ensure that these threats are absent from any recipient site. Planning a reintroduction requires considering legal and logistic parameters as well as target species and recipient site attributes.Carefully selecting the genetic composition of founders, founder population size, and recipient site will influence establishment and population growth. Whenever possible practitioners should conduct reintroductions as experiments and publish results. To document whether populations are sustainable will require long-term monitoring for decades, therefore planning an appropriate monitoring technique for the taxon must consider current and future needs. Botanical gardens can play a leading role in developing the science and practice of plant reintroduction.展开更多
Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and ...Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time.展开更多
In present scenario of wireless communications,Long Term Evolution(LTE)based network technology is evolved and provides consistent data delivery with high speed andminimal delay through mobile devices.The traffic mana...In present scenario of wireless communications,Long Term Evolution(LTE)based network technology is evolved and provides consistent data delivery with high speed andminimal delay through mobile devices.The traffic management and effective utilization of network resources are the key factors of LTE models.Moreover,there are some major issues in LTE that are to be considered are effective load scheduling and traffic management.Through LTE is a depraved technology,it is been suffering from these issues.On addressing that,this paper develops an Elite Opposition based Spider Monkey Optimization Framework for Efficient Load Balancing(SMO-ELB).In this model,load computation of each mobile node is done with Bounding Theory based Load derivations and optimal cell selection for seamless communication is processed with Spider Monkey Optimization Algorithm.The simulation results show that the proposed model provides better results than exiting works in terms of efficiency,packet delivery ratio,Call Dropping Ratio(CDR)and Call Blocking Ratio(CBR).展开更多
The research work presents,constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties.The charge fragmentation and charge splitt...The research work presents,constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties.The charge fragmentation and charge splitting are two components of the filtered switch domino(FSD)technique.Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino(MDND)technique.Both FSD and MDND technique need wide area compared to existing single nodekeeper domino technique.The aim of this research is to minimize dissipation of power and to achieve less consumption of power.The proposed research,works by introducing the method namely Interference and throughput aware Optimized Multicast Routing Protocol(IT-OMRP).The main goal of this proposed research method is to introduce the system which can forward the data packets towards the destination securely and successfully.To achieve the bandwidth and throughput in optimized data transmission,proposed multicast tree is selected by Particle Swarm Optimization which will select the most optimal host node as the branches of multi cast tree.Here node selection is done by considering the objectives residual energy,residual bandwidth and throughput.After node selection multi cast routing is done with the concern of interference to ensure the reliable and successful data transmission.In case of transmission range size is higher than the coverage sense range,successful routing is ensured by selecting secondary host forwarders as a backup which will act as intermediate relay forwarders.The NS2 simulator is used to evaluate research outcome from which it is proved that the proposed technique tends to have increased packet delivery ratio than the existing work.展开更多
Optimal route selection is an important function of vehicle traffic flow guidance system. Its core is to determine the index weight for measuring the route merits and to determine the evaluation method for selecting r...Optimal route selection is an important function of vehicle traffic flow guidance system. Its core is to determine the index weight for measuring the route merits and to determine the evaluation method for selecting route. In this paper, subjective weighting method which relies on driver preference is used to determine the weight and the paper proposes the multi-criteria weighted decision method based on vague sets for selecting the optimal route. Examples show that, the usage of vague sets to describe route index value can provide more decision-making information for route selection.展开更多
In recent years,green concepts have been integrated into the product iterative design in the manufacturing field to address global competition and sustainability issues.However,previous efforts for green material opti...In recent years,green concepts have been integrated into the product iterative design in the manufacturing field to address global competition and sustainability issues.However,previous efforts for green material optimal selection disregarded the interaction and fusion among physical entities,virtual models,and users,resulting in distortions and inaccuracies among user,physical entity,and virtual model such as inconsistency among the expected value,predicted simulation value,and actual performance value of evaluation indices.Therefore,this study proposes a digital twin-driven green material optimal selection and evolution method for product iterative design.Firstly,a novel framework is proposed.Subsequently,an analysis is carried out from six perspectives:the digital twin model construction for green material optimal selection,evolution mechanism of the digital twin model,multi-objective prediction and optimization,algorithm design,decision-making,and product function verification.Finally,taking the material selection of a shared bicycle frame as an example,the proposed method was verified by the prediction and iterative optimization of the carbon emission index.展开更多
This paper investigates a multi-period portfolio optimization problem for a defined contribution pension plan with Telser's safety-first criterion.The plan members aim to maximize the expected terminal wealth subj...This paper investigates a multi-period portfolio optimization problem for a defined contribution pension plan with Telser's safety-first criterion.The plan members aim to maximize the expected terminal wealth subject to a constraint that the probability of the terminal wealth falling below a disaster level is less than a pre-determined number called risk control level.By Tchebycheff inequality,Lagrange multiplier technique,the embedding method and Bellman's principle of optimality,the authors obtain the conditions under which the optimal strategy exists and derive the closed-form optimal strategy and value function.Special cases show that the obtained results in this paper can be reduced to those in the classical mean-variance model.Finally,numerical analysis is provided to analyze the effects of the risk control level,the disaster level and the contribution proportion on the disaster probability and the value function.The numerical analysis indicates that the disaster probability in this paper is less than that in the classical mean-variance model on the premise that the value functions are the same in two models.展开更多
文摘Responding to complex analytical queries in the data warehouse(DW)is one of the most challenging tasks that require prompt attention.The problem of materialized view(MV)selection relies on selecting the most optimal views that can respond to more queries simultaneously.This work introduces a combined approach in which the constraint handling process is combined with metaheuristics to select the most optimal subset of DW views from DWs.The proposed work initially refines the solution to enable a feasible selection of views using the ensemble constraint handling technique(ECHT).The constraints such as self-adaptive penalty,epsilon(ε)-parameter and stochastic ranking(SR)are considered for constraint handling.These two constraints helped the proposed model select the finest views that minimize the objective function.Further,a novel and effective combination of Ebola and coot optimization algorithms named hybrid Ebola with coot optimization(CHECO)is introduced to choose the optimal MVs.Ebola and Coot have recently introduced metaheuristics that identify the global optimal set of views from the given population.By combining these two algorithms,the proposed framework resulted in a highly optimized set of views with minimized costs.Several cost functions are described to enable the algorithm to choose the finest solution from the problem space.Finally,extensive evaluations are conducted to prove the performance of the proposed approach compared to existing algorithms.The proposed framework resulted in a view maintenance cost of 6,329,354,613,784,query processing cost of 3,522,857,483,566 and execution time of 226 s when analyzed using the TPC-H benchmark dataset.
文摘Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is enormous.Its uses have expanded in lockstep with its growth.Due to its instability in usage and the fact that numerous nodes communicate data concur-rently,adequate channel and forwarder selection is essential.In this proposed design for a Cognitive Radio Cognitive Network(CRCN),we gain the confidence of each forwarding node by contacting one-hop and second level nodes,obtaining reports from them,and selecting the forwarder appropriately with the use of an optimization technique.At that point,we concentrate our efforts on their channel,selection,and lastly,the transmission of data packets via the designated forwarder.The simulation work is validated in this section using the MATLAB program.Additionally,steps show how the node acts as a confident forwarder and shares the channel in a compatible method to communicate,allowing for more packet bits to be transmitted by conveniently picking the channel between them.We cal-culate the confidence of the node at the start of the network by combining the reliability report for thefirst hop and the reliability report for the secondary hop.We then refer to the same node as the confident node in order to operate as a forwarder.As a result,we witness an increase in the leftover energy in the output.The percentage of data packets delivered has also increased.
基金support by the National Natural Science Foundation of China (Grant No. 62005049)Natural Science Foundation of Fujian Province (Grant Nos. 2020J01451, 2022J05113)Education and Scientific Research Program for Young and Middleaged Teachers in Fujian Province (Grant No. JAT210035)。
文摘Camouflaged people are extremely expert in actively concealing themselves by effectively utilizing cover and the surrounding environment. Despite advancements in optical detection capabilities through imaging systems, including spectral, polarization, and infrared technologies, there is still a lack of effective real-time method for accurately detecting small-size and high-efficient camouflaged people in complex real-world scenes. Here, this study proposes a snapshot multispectral image-based camouflaged detection model, multispectral YOLO(MS-YOLO), which utilizes the SPD-Conv and Sim AM modules to effectively represent targets and suppress background interference by exploiting the spatial-spectral target information. Besides, the study constructs the first real-shot multispectral camouflaged people dataset(MSCPD), which encompasses diverse scenes, target scales, and attitudes. To minimize information redundancy, MS-YOLO selects an optimal subset of 12 bands with strong feature representation and minimal inter-band correlation as input. Through experiments on the MSCPD, MS-YOLO achieves a mean Average Precision of 94.31% and real-time detection at 65 frames per second, which confirms the effectiveness and efficiency of our method in detecting camouflaged people in various typical desert and forest scenes. Our approach offers valuable support to improve the perception capabilities of unmanned aerial vehicles in detecting enemy forces and rescuing personnel in battlefield.
文摘Accurate multi-source fusion is based on the reliability, quantity, and fusion mode of the sources. The problem of selecting the optimal set for participating in the fusion process is nondeterministic-polynomial-time-hard and is neither sub-modular nor super-modular. Furthermore, in the case of the Kalman filter(KF) fusion algorithm, accurate statistical characteristics of noise are difficult to obtain, and this leads to an unsatisfactory fusion result. To settle the referred cases, a distributed and adaptive weighted fusion algorithm based on KF has been proposed in this paper. In this method, on the basis of the pseudo prior probability of the estimated state of each source, the reliability of the sources is evaluated and the optimal set is selected on a certain threshold. Experiments were performed on multi-source pedestrian dead reckoning for verifying the proposed algorithm. The results obtained from these experiments indicate that the optimal set can be selected accurately with minimal computation, and the fusion error is reduced by 16.6% as compared to the corresponding value resulting from the algorithm without improvements.The proposed adaptive source reliability and fusion weight evaluation is effective against the varied-noise multi-source fusion system, and the fusion error caused by inaccurate statistical characteristics of the noise is reduced by the adaptive weight evaluation.The proposed algorithm exhibits good robustness, adaptability,and value on applications.
基金Taif University Researchers Supporting Project Number(TURSP-2020/154),Taif University,Taif,Saudi Arabia.
文摘Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process(OPSP)acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarmoptimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.
文摘Selecting the optimal one from similar schemes is a paramount work in equipment design.In consideration of similarity of schemes and repetition of characteristic indices,the theory of set pair analysis(SPA)is proposed,and then an optimal selection model is established.In order to improve the accuracy and flexibility,the model is modified by the contribution degree.At last,this model has been validated by an example,and the result demonstrates the method is feasible and valuable for practical usage.
基金This paper is supported by the National Key R&D Program of China(2017YFB0802703)the National Nature Science Foundation of China(61602052).
文摘As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers.Although the moving target defense(MTD)has been proposed to increase the attack difficulty for the attackers,there is no solo approach can cope with different attacks;in addition,it is impossible to implement all these approaches simultaneously due to the resource limitation.Thus,the selection of an optimal defense strategy based on MTD has become the focus of research.In general,the confrontation of two players in the security domain is viewed as a stochastic game,and the reward matrices are known to both players.However,in a real security confrontation,this scenario represents an incomplete information game.Each player can only observe the actions performed by the opponent,and the observed actions are not completely accurate.To accurately describe the attacker’s reward function to reach the Nash equilibrium,this work simulated and updated the strategy selection distribution of the attacker by observing and investigating the strategy selection history of the attacker.Next,the possible rewards of the attacker in each confrontation via the observation matrix were corrected.On this basis,the Nash-Q learning algorithm with reward quantification was proposed to select the optimal strategy.Moreover,the performances of the Minimax-Q learning algorithm and Naive-Q learning algorithm were compared and analyzed in the MTD environment.Finally,the experimental results showed that the strategy selection algorithm can enable defenders to select a more reasonable defensive strategy and achieve the maximum possible reward.
文摘A spectral match optimization based on grey incidence matrix was put forward to evaluate camouflage painting design.A synthetic degree of incidence (SDI) was defined to comprehensively reflect the spectrum similarity based on theory of grey incidence analysis.A grey optimization model for camouflage painting sheme was constructed on the basis of SDI and grey incidence matrix.Its weight values were determined according to area percentages of all components in the camouflage scene,and a quantitative ordering for various schemes could be obtained according to the evaluation coefficients.Experiment results show that the method mentioned in this paper can provide a quantitative basis for the camouflage decision-making,and it can also be used in other camouflage scheme selection.
基金The author extends his appreciation to the Deputyship for Research&Innovation,Ministry of Education and Qassim University,Saudi Arabia for funding this research work through the Project Number(QU-IF-4-3-3-30013).
文摘The tendency toward achieving more sustainable and green buildings turned several passive buildings into more dynamic ones.Mosques are the type of buildings that have a unique energy usage pattern.Nevertheless,these types of buildings have minimal consideration in the ongoing energy efficiency applications.This is due to the unpredictability in the electrical consumption of the mosques affecting the stability of the distribution networks.Therefore,this study addresses this issue by developing a framework for a short-term electricity load forecast for a mosque load located in Riyadh,Saudi Arabia.In this study,and by harvesting the load consumption of the mosque and meteorological datasets,the performance of four forecasting algorithms is investigated,namely Artificial Neural Network and Support Vector Regression(SVR)based on three kernel functions:Radial Basis(RB),Polynomial,and Linear.In addition,this research work examines the impact of 13 different combinations of input attributes since selecting the optimal features has a major influence on yielding precise forecasting outcomes.For the mosque load,the(SVR-RB)with eleven features appeared to be the best forecasting model with the lowest forecasting errors metrics giving RMSE,nRMSE,MAE,and nMAE values of 4.207 kW,2.522%,2.938 kW,and 1.761%,respectively.
文摘A groundbreaking method is introduced to leverage machine learn-ing algorithms to revolutionize the prediction of success rates for science fiction films.In the captivating world of the film industry,extensive research and accurate forecasting are vital to anticipating a movie’s triumph prior to its debut.Our study aims to harness the power of available data to estimate a film’s early success rate.With the vast resources offered by the internet,we can access a plethora of movie-related information,including actors,directors,critic reviews,user reviews,ratings,writers,budgets,genres,Facebook likes,YouTube views for movie trailers,and Twitter followers.The first few weeks of a film’s release are crucial in determining its fate,and online reviews and film evaluations profoundly impact its opening-week earnings.Hence,our research employs advanced supervised machine learning techniques to predict a film’s triumph.The Internet Movie Database(IMDb)is a comprehensive data repository for nearly all movies.A robust predictive classification approach is developed by employing various machine learning algorithms,such as fine,medium,coarse,cosine,cubic,and weighted KNN.To determine the best model,the performance of each feature was evaluated based on composite metrics.Moreover,the significant influences of social media platforms were recognized including Twitter,Instagram,and Facebook on shaping individuals’opinions.A hybrid success rating prediction model is obtained by integrating the proposed prediction models with sentiment analysis from available platforms.The findings of this study demonstrate that the chosen algorithms offer more precise estimations,faster execution times,and higher accuracy rates when compared to previous research.By integrating the features of existing prediction models and social media sentiment analysis models,our proposed approach provides a remarkably accurate prediction of a movie’s success.This breakthrough can help movie producers and marketers anticipate a film’s triumph before its release,allowing them to tailor their promotional activities accordingly.Furthermore,the adopted research lays the foundation for developing even more accurate prediction models,considering the ever-increasing significance of social media platforms in shaping individ-uals’opinions.In conclusion,this study showcases the immense potential of machine learning algorithms in predicting the success rate of science fiction films,opening new avenues for the film industry.
基金supported by the Natural Science Foundation of Jiangsu Province (No. BK20151479)the Open Foundation of Graduate Innovation Base in Nanjing University of Aeronautics and Astronautics(No. kfjj20190736)
基金Guangxi Chairman's Foundation grant #09203-04 to Hong Liu and colleagues supported JM attendance at the IABG conference possiblefunding from the U.S. Fish and Wildlife Service(1448-40181-99-G173)+4 种基金Florida Department of Agriculture and Consumer Services (#20161,021010,022647)Miami-Dade County Natural Areas Management and Environmentally Endangered Lands Program (R-80807)Arizona Department of TransportationU.S. Forest ServiceU.S. National Park Service
文摘Recent estimates indicate that one-fifth of botanical species worldwide are considered at risk of becoming extinct in the wild. One available strategy for conserving many rare plant species is reintroduction, which holds much promise especially when carefully planned by following guidelines and when monitored long-term. We review the Center for Plant Conservation Best Reintroduction Practice Guidelines and highlight important components for planning plant reintroductions. Before attempting reintroductions practitioners should justify them, should consider alternative conservation strategies, understand threats, and ensure that these threats are absent from any recipient site. Planning a reintroduction requires considering legal and logistic parameters as well as target species and recipient site attributes.Carefully selecting the genetic composition of founders, founder population size, and recipient site will influence establishment and population growth. Whenever possible practitioners should conduct reintroductions as experiments and publish results. To document whether populations are sustainable will require long-term monitoring for decades, therefore planning an appropriate monitoring technique for the taxon must consider current and future needs. Botanical gardens can play a leading role in developing the science and practice of plant reintroduction.
基金This paper is supported in part by the National Natural Science Foundation of China(61701322)the Young and Middle-aged Science and Technology Innovation Talent Support Plan of Shenyang(RC190026)+1 种基金the Natural Science Foundation of Liaoning Province(2020-MS-237)the Liaoning Provincial Department of Education Science Foundation(JYT19052).
文摘Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time.
文摘In present scenario of wireless communications,Long Term Evolution(LTE)based network technology is evolved and provides consistent data delivery with high speed andminimal delay through mobile devices.The traffic management and effective utilization of network resources are the key factors of LTE models.Moreover,there are some major issues in LTE that are to be considered are effective load scheduling and traffic management.Through LTE is a depraved technology,it is been suffering from these issues.On addressing that,this paper develops an Elite Opposition based Spider Monkey Optimization Framework for Efficient Load Balancing(SMO-ELB).In this model,load computation of each mobile node is done with Bounding Theory based Load derivations and optimal cell selection for seamless communication is processed with Spider Monkey Optimization Algorithm.The simulation results show that the proposed model provides better results than exiting works in terms of efficiency,packet delivery ratio,Call Dropping Ratio(CDR)and Call Blocking Ratio(CBR).
文摘The research work presents,constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties.The charge fragmentation and charge splitting are two components of the filtered switch domino(FSD)technique.Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino(MDND)technique.Both FSD and MDND technique need wide area compared to existing single nodekeeper domino technique.The aim of this research is to minimize dissipation of power and to achieve less consumption of power.The proposed research,works by introducing the method namely Interference and throughput aware Optimized Multicast Routing Protocol(IT-OMRP).The main goal of this proposed research method is to introduce the system which can forward the data packets towards the destination securely and successfully.To achieve the bandwidth and throughput in optimized data transmission,proposed multicast tree is selected by Particle Swarm Optimization which will select the most optimal host node as the branches of multi cast tree.Here node selection is done by considering the objectives residual energy,residual bandwidth and throughput.After node selection multi cast routing is done with the concern of interference to ensure the reliable and successful data transmission.In case of transmission range size is higher than the coverage sense range,successful routing is ensured by selecting secondary host forwarders as a backup which will act as intermediate relay forwarders.The NS2 simulator is used to evaluate research outcome from which it is proved that the proposed technique tends to have increased packet delivery ratio than the existing work.
基金Supported by the Provincial Government Decision-making Tender Subject(2013B318)Supported by the Educational Committee of Henan Province of China(15A520004)
文摘Optimal route selection is an important function of vehicle traffic flow guidance system. Its core is to determine the index weight for measuring the route merits and to determine the evaluation method for selecting route. In this paper, subjective weighting method which relies on driver preference is used to determine the weight and the paper proposes the multi-criteria weighted decision method based on vague sets for selecting the optimal route. Examples show that, the usage of vague sets to describe route index value can provide more decision-making information for route selection.
基金supported by the National Natural Science Foundation of China(Grant Nos.51975431 and 52005025)the Fundamental Research Funds for the Central Universities(Grant No.51705379)in China.
文摘In recent years,green concepts have been integrated into the product iterative design in the manufacturing field to address global competition and sustainability issues.However,previous efforts for green material optimal selection disregarded the interaction and fusion among physical entities,virtual models,and users,resulting in distortions and inaccuracies among user,physical entity,and virtual model such as inconsistency among the expected value,predicted simulation value,and actual performance value of evaluation indices.Therefore,this study proposes a digital twin-driven green material optimal selection and evolution method for product iterative design.Firstly,a novel framework is proposed.Subsequently,an analysis is carried out from six perspectives:the digital twin model construction for green material optimal selection,evolution mechanism of the digital twin model,multi-objective prediction and optimization,algorithm design,decision-making,and product function verification.Finally,taking the material selection of a shared bicycle frame as an example,the proposed method was verified by the prediction and iterative optimization of the carbon emission index.
基金supported by grants from Innovation Research in Central University of Finance and Economics,National Natural Science Foundation of China under Grant Nos.11671411,71871071,72071051,Guangdong Basic and Applied Basic Research Foundation under Grant No.2018B030311004,the Key Program of the National Social Science Foundation of China under Grant No.21AZD071 and the 111 Project under Grant No.B17050.
文摘This paper investigates a multi-period portfolio optimization problem for a defined contribution pension plan with Telser's safety-first criterion.The plan members aim to maximize the expected terminal wealth subject to a constraint that the probability of the terminal wealth falling below a disaster level is less than a pre-determined number called risk control level.By Tchebycheff inequality,Lagrange multiplier technique,the embedding method and Bellman's principle of optimality,the authors obtain the conditions under which the optimal strategy exists and derive the closed-form optimal strategy and value function.Special cases show that the obtained results in this paper can be reduced to those in the classical mean-variance model.Finally,numerical analysis is provided to analyze the effects of the risk control level,the disaster level and the contribution proportion on the disaster probability and the value function.The numerical analysis indicates that the disaster probability in this paper is less than that in the classical mean-variance model on the premise that the value functions are the same in two models.