期刊文献+
共找到104篇文章
< 1 2 6 >
每页显示 20 50 100
A Conceptual and Computational Framework for Aspect-Based Collaborative Filtering Recommender Systems 被引量:1
1
作者 Samin Poudel Marwan Bikdash 《Journal of Computer and Communications》 2023年第3期110-130,共21页
Many datasets in E-commerce have rich information about items and users who purchase or rate them. This information can enable advanced machine learning algorithms to extract and assign user sentiments to various aspe... Many datasets in E-commerce have rich information about items and users who purchase or rate them. This information can enable advanced machine learning algorithms to extract and assign user sentiments to various aspects of the items thus leading to more sophisticated and justifiable recommendations. However, most Collaborative Filtering (CF) techniques rely mainly on the overall preferences of users toward items only. And there is lack of conceptual and computational framework that enables an understandable aspect-based AI approach to recommending items to users. In this paper, we propose concepts and computational tools that can sharpen the logic of recommendations and that rely on users’ sentiments along various aspects of items. These concepts include: The sentiment of a user towards a specific aspect of a specific item, the emphasis that a given user places on a specific aspect in general, the popularity and controversy of an aspect among groups of users, clusters of users emphasizing a given aspect, clusters of items that are popular among a group of users and so forth. The framework introduced in this study is developed in terms of user emphasis, aspect popularity, aspect controversy, and users and items similarity. Towards this end, we introduce the Aspect-Based Collaborative Filtering Toolbox (ABCFT), where the tools are all developed based on the three-index sentiment tensor with the indices being the user, item, and aspect. The toolbox computes solutions to the questions alluded to above. We illustrate the methodology using a hotel review dataset having around 6000 users, 400 hotels and 6 aspects. 展开更多
关键词 Recommender System Collaborative Filtering Aspect based recommendation Recommendation System Framework Aspect Sentiments
下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
2
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
下载PDF
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
3
作者 R.Brindha S.Nandagopal +3 位作者 H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim 《Computers, Materials & Continua》 SCIE EI 2023年第3期5901-5914,共14页
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in cyberattacks.Though the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the victims.In this background,there is a drastic increase observed in the number of phishing emails sent to potential targets.This scenario necessitates the importance of designing an effective classification model.Though numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the literature.The current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)model.The aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing ones.At the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word elimination.Then,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature vectors.Moreover,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing emails.Furthermore,the CS algorithm is used to fine-tune the parameters involved in the GRU model.The performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several dimensions.Extensive comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing approaches.The proposed model achieved a maximum accuracy of 99.72%. 展开更多
关键词 Phishing email data classification natural language processing deep learning CYBERSECURITY
下载PDF
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
4
作者 S.Padmapriya R.Shankar +3 位作者 R.Thiagarajan N.Partheeban A.Daniel S.Arun 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期491-505,共15页
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t... The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio. 展开更多
关键词 Mobile ad-hoc network(MANET) wireless ad hoc network ADOV ATTACKS denial of service
下载PDF
Assessment of Municipal Solid Waste Management in the Farmgate Area of Dhaka North City Corporation
5
作者 Seyedali Mirmotalebi Shoeb Rahman +1 位作者 Mayida Rubya Tithi Imran Khan Apu 《World Journal of Engineering and Technology》 2024年第1期1-23,共23页
This investigation is focused on conducting a thorough analysis of Municipal Solid Waste Management (MSWM). MSWM encompasses a range of interdisciplinary measures that govern the various stages involved in managing un... This investigation is focused on conducting a thorough analysis of Municipal Solid Waste Management (MSWM). MSWM encompasses a range of interdisciplinary measures that govern the various stages involved in managing unwanted or non-utilizable solid materials, commonly known as rubbish, trash, junk, refuse, and garbage. These stages include generation, storage, collection, recycling, transportation, handling, disposal, and monitoring. The waste materials mentioned in this context exhibit a wide range of items, such as organic waste from food and vegetables, paper, plastic, polyethylene, iron, tin cans, deceased animals, byproducts from demolition activities, manure, and various other discarded materials. This study aims to provide insights into the possibilities of enhancing solid waste management in the Farmgate area of Dhaka North City Corporation (DNCC). To accomplish this objective, the research examines the conventional waste management methods employed in this area. It conducts extensive field surveys, collecting valuable data through interviews with local residents and key individuals involved in waste management, such as waste collectors, dealers, intermediate dealers, recyclers, and shopkeepers. The results indicate that significant amounts of distinct waste categories are produced daily. These include food and vegetable waste, which amount to 52.1 tons/day;polythene and plastic, which total 4.5 tons/day;metal and tin-can waste, which amounts to 1.4 tons/day;and paper waste, which totals 5.9 tons/day. This study highlights the significance of promoting environmental consciousness to effectively shape the attitudes of urban residents toward waste disposal and management. It emphasizes the need for collaboration between authorities and researchers to improve the current waste management system. 展开更多
关键词 Solid Waste Management Dhaka North City Corporation Sustainable Growth Integrated Waste Management Practice Waste Recycling
下载PDF
A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine 被引量:7
6
作者 Hao Zhang Yongdan Li +2 位作者 Zhihan Lv Arun Kumar Sangaiah Tao Huang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期790-799,共10页
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network... In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine(DBN-SVM). Sliding window(SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented.Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method's real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions. 展开更多
关键词 DEEP BELIEF network(DBN) flow calculation frequent pattern INTRUSION detection SLIDING WINDOW support vector machine(SVM)
下载PDF
Atomistic simulation of free transverse vibration of graphene,hexagonal SiC, and BN nanosheets 被引量:1
7
作者 Danh-Truong Nguyen Minh-Quy Le +1 位作者 Thanh-Lam Bui Hai-Le Bui 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2017年第1期132-147,共16页
Free transverse vibration of monolayer graphene, boron nitride (BN), and silicon carbide (SiC) sheets is investigated by using molecular dynamics finite element method. Eigenfrequencies and eigenmodes of these three s... Free transverse vibration of monolayer graphene, boron nitride (BN), and silicon carbide (SiC) sheets is investigated by using molecular dynamics finite element method. Eigenfrequencies and eigenmodes of these three sheets in rectangular shape are studied with different aspect ratios with respect to various boundary conditions. It is found that aspect ratios and boundary conditions affect in a similar way on natural frequencies of graphene, BN, and SiC sheets. Natural frequencies in all modes decrease with an increase of the sheet’s size. Graphene exhibits the highest natural frequencies, and SiC sheet possesses the lowest ones. Missing atoms have minor effects on natural frequencies in this study. 展开更多
关键词 Atomistic simulation Hexagonal sheet Transverse vibration Molecular dynamics finite element method
下载PDF
Harmonic and attosecond pulse enhancement in the presence of noise 被引量:1
8
作者 冯立强 楚天舒 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第12期258-262,共5页
In this paper, we theoretically investigate the effect of noise on the photoionization, the generation of the high-order harmonic and the attosecond pulse irradiated from a model He+ ion. It shows that by properly ad... In this paper, we theoretically investigate the effect of noise on the photoionization, the generation of the high-order harmonic and the attosecond pulse irradiated from a model He+ ion. It shows that by properly adding noise fields, such as Gaussian white noise, random light or colored noise, both the ionization probabilities (IPs) and the harmonic yields can be enhanced by several orders of magnitude. Further, by tuning the noise intensity, a stochastic resonance-like curve is observed, showing the existence of an optimal noise in the ionization enhancement process. Finally, by superposing a properly selected harmonic, an intense attosecond pulse with a duration of 67 as is directly generated. 展开更多
关键词 high-order harmonic generation isolated attosecond pulse PHOTOIONIZATION
下载PDF
Emergency Gesture Communication by Patients, Elderly and Differently Abled with Care Takers Using Wearable Data Gloves 被引量:1
9
作者 Kalvina Rajendran Andrews Samraj Maheswari Rajavel 《Journal of Signal and Information Processing》 2013年第1期1-9,共9页
The Healthcare monitoring on a clinical base involves many implicit communication between the patient and the care takers. Any misinterpretation leads to adverse effects. A simple wearable system can precisely interpr... The Healthcare monitoring on a clinical base involves many implicit communication between the patient and the care takers. Any misinterpretation leads to adverse effects. A simple wearable system can precisely interpret the implicit communication to the care takers or to an automated support device. Simple and obvious hand movements can be used for the above purpose. The proposed system suggests a novel methodology simpler than the existing sign language interpretations for such implicit communication. The experimental results show a well-distinguished realization of different hand movement activities using a wearable sensor medium and the interpretation results always show significant thresholds. 展开更多
关键词 WEARABLE COMPUTING Bio-Signal Processing ROBOTIC Interface Affective-Gesture COMPUTING
下载PDF
Mechanism of Excited State Double Proton Transfer in 2-Amino-3-Methoxypyridine and Acetic Acid Complex
10
作者 孟庆池 羊送球 +1 位作者 任广华 楚天舒 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第9期87-89,共3页
The excited-state double-proton transfer (ESDPT) mechanism of 2-amino-3-methoxypyridine and acetic acid com- plex is studied by the density functional theory (DFT) and time-dependent DFT with CAM-B3LYP functional.... The excited-state double-proton transfer (ESDPT) mechanism of 2-amino-3-methoxypyridine and acetic acid com- plex is studied by the density functional theory (DFT) and time-dependent DFT with CAM-B3LYP functional. The complex is connected through two different types of inter-molecular hydrogen bonds. After photo-excitation, both hydrogen bonds get strengthened, which can facilitate the ESDPT reaction. The scanned potential energy curve along the proton transfer coordinate indicates that the ESDPT reaction proceeds in a stepwise pattern. 展开更多
关键词 LYP CAM PT MOP Mechanism of Excited State Double Proton Transfer in 2-Amino-3-Methoxypyridine and Acetic Acid Complex
下载PDF
Stereoselectivities in α- and β-Amino Acids Catalyzed Mannich Reactions Involving Cyclohexanone
11
作者 WANG Ying FU Ai-ping LI Hong-liang TIAN Feng-hui YUAN Shu-ping SI Hong-zong DUAN Yun-bo WANG Zong-hua 《Chemical Research in Chinese Universities》 SCIE CAS CSCD 2011年第4期673-677,共5页
The effects of two different amino acid catalysts on the stereoselectivities in the direct Mannich reactions of cyclohexanone,p-anisidine and p-nitrobenzaldehyde were studied with the aid of density functional theory.... The effects of two different amino acid catalysts on the stereoselectivities in the direct Mannich reactions of cyclohexanone,p-anisidine and p-nitrobenzaldehyde were studied with the aid of density functional theory.Transition states of the stereo-determining C "C bond-forming step with the addition of enamine intermediate to the imine for the L-proline(·-amino acid) and (R)-3-pyrrolidinecarboxylic acid(·-amino acid)-catalyzed processes were reported.B3LYP/6-31G calculations provide a good explanation for the opposite syn vs.anti diastereoselectivities of these two different kinds of catalysts(syn-selectivity for the ·-amino acid catalysts,anti-selectivity for the ·-amino acid catalysts).Calculated and observed diastereomeric ratio and enantiomeric excess values are in reasonable agreement. 展开更多
关键词 Syn-and anti-Mannich reaction STEREOSELECTIVITY Amino acid Transition state
下载PDF
The stereodynamic properties of the F+HO(v,j) → HF+O reaction on^1 A' and ~3A' potential energy surfaces by quasi-classical trajectory calculations:Initial excitation effect(v=1-3, j=0 and v= 0, j=1-3)
12
作者 赵丹 楚天舒 郝策 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期330-337,共8页
The stereodynamic properties of the F + HO (v, j) reaction are explored by quasi-classical trajectory (QCT) calculations performed on the 1At and 3At potential energy surfaces (PESs). Based on the polarization-... The stereodynamic properties of the F + HO (v, j) reaction are explored by quasi-classical trajectory (QCT) calculations performed on the 1At and 3At potential energy surfaces (PESs). Based on the polarization-dependent differential cross sections (PDDCSs) and the angular distributions of the product angular momentum with the reactant at different values of initial v or j, the results show that the product scattering and product polarization have strong links with initial vibrationalrotational numbers of v and j. The significant manifestation of the normal DCSs is that the forward scattering gradually becomes predominant with the initial vibrational excitation increasing, and the scattering angle of the HF product taking place on the 3At potential energy surface is found to be more sensitive to the initial value of v. The product orientation and alignment are strongly dependent on the initial rovibrational excitation effect. With enhancement in the initial rovibrational excitation effect, there is an overall decrease in the product orientation as well as in the product alignment either perpendicular to the reagent relative velocity vector k or along the direction of the y axis, for which the initial rotational excitation effect is much more noticeable than the vibrational excitation effect. Moreover, the initial rovibrational excitation effect on the product polarization is more pronounced for the 3At potential energy surface than for the 1At potential energy surface. 展开更多
关键词 STEREODYNAMICS quasi-classical trajectory rotational excitation vibrational excitation
下载PDF
Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks
13
作者 Rajesh Kumar Dhanaraj Lalitha Krishnasamy +1 位作者 Oana Geman Diana Roxana Izdrui 《Computers, Materials & Continua》 SCIE EI 2021年第8期1949-1965,共17页
In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthca... In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthcare WBANs are the black hole and sink hole attacks.Data from deployed sensor nodes are attracted by sink hole or black hole nodes while grabbing the shortest path.Identifying this issue is quite a challenging task as a small variation in medicine intake may result in a severe illness.This work proposes a hybrid detection framework for attacks by applying a Proportional Coinciding Score(PCS)and an MK-Means algorithm,which is a well-known machine learning technique used to raise attack detection accuracy and decrease computational difficulties while giving treatments for heartache and respiratory issues.First,the gathered training data feature count is reduced through data pre-processing in the PCS.Second,the pre-processed features are sent to the MK-Means algorithm for training the data and promoting classification.Third,certain attack detection measures given by the intrusion detection system,such as the number of data packages trans-received,are identified by the MK-Means algorithm.This study demonstrates that the MK-Means framework yields a high detection accuracy with a low packet loss rate,low communication overhead,and reduced end-to-end delay in the network and improves the accuracy of biomedical data. 展开更多
关键词 Wireless body area network black hole attack sink hole attack proportional coinciding score intrusion detection correlation rate
下载PDF
Multi-Objective High-Fidelity Optimization Using NSGA-III and MO-RPSOLC
14
作者 N.Ganesh Uvaraja Ragavendran +2 位作者 Kanak Kalita Paras Jain Xiao-Zhi Gao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第11期443-464,共22页
Optimizing the performance of composite structures is a real-world application with significant benefits.In this paper,a high-fidelity finite element method(FEM)is combined with the iterative improvement capability of... Optimizing the performance of composite structures is a real-world application with significant benefits.In this paper,a high-fidelity finite element method(FEM)is combined with the iterative improvement capability of metaheuristic optimization algorithms to obtain optimized composite plates.The FEM module comprises of ninenode isoparametric plate bending element in conjunction with the first-order shear deformation theory(FSDT).A recently proposed memetic version of particle swarm optimization called RPSOLC is modified in the current research to carry out multi-objective Pareto optimization.The performance of the MO-RPSOLC is found to be comparable with the NSGA-III.This work successfully highlights the use of FEM-MO-RPSOLC in obtaining highfidelity Pareto solutions considering simultaneous maximization of the fundamental frequency and frequency separation in laminated composites by optimizing the stacking sequence. 展开更多
关键词 COMPOSITES finite element OPTIMIZATION PARETO swarm intelligence
下载PDF
Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks
15
作者 Mohammed M. Olama Seddik M. Djouadi Charalambos D. Charalambous 《Communications and Network》 2014年第3期155-164,共10页
Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuo... Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented. 展开更多
关键词 WIRELESS Networks TIME-VARYING WIRELESS Fading Channel Impulse Response Doppler POWER Spectral Density STOCHASTIC STATE-SPACE Model STOCHASTIC Modeling Optimal POWER Control EXPECTATION Maximization Kalman Filter
下载PDF
Industrial Centric Node Localization and Pollution Prediction Using Hybrid Swarm Techniques
16
作者 R.Saravana Ram M.Vinoth Kumar +3 位作者 N.Krishnamoorthy A.Baseera D.Mansoor Hussain N.Susila 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期545-560,共16页
Major fields such as military applications,medical fields,weather forecasting,and environmental applications use wireless sensor networks for major computing processes.Sensors play a vital role in emerging technologie... Major fields such as military applications,medical fields,weather forecasting,and environmental applications use wireless sensor networks for major computing processes.Sensors play a vital role in emerging technologies of the 20th century.Localization of sensors in needed locations is a very serious problem.The environment is home to every living being in the world.The growth of industries after the industrial revolution increased pollution across the environment.Owing to recent uncontrolled growth and development,sensors to measure pollution levels across industries and surroundings are needed.An interesting and challenging task is choosing the place to fit the sensors.Many meta-heuristic techniques have been introduced in node localization.Swarm intelligent algorithms have proven their efficiency in many studies on localization problems.In this article,we introduce an industrial-centric approach to solve the problem of node localization in the sensor network.First,our work aims at selecting industrial areas in the sensed location.We use random forest regression methodology to select the polluted area.Then,the elephant herding algorithm is used in sensor node localization.These two algorithms are combined to produce the best standard result in localizing the sensor nodes.To check the proposed performance,experiments are conducted with data from the KDD Cup 2018,which contain the name of 35 stations with concentrations of air pollutants such as PM,SO_(2),CO,NO_(2),and O_(3).These data are normalized and tested with algorithms.The results are comparatively analyzed with other swarm intelligence algorithms such as the elephant herding algorithm,particle swarm optimization,and machine learning algorithms such as decision tree regression and multi-layer perceptron.Results can indicate our proposed algorithm can suggest more meaningful locations for localizing the sensors in the topology.Our proposed method achieves a lower root mean square value with 0.06 to 0.08 for localizing with Stations 1 to 5. 展开更多
关键词 Wireless sensor networks node localization industrial-centric approach random forest regression elephant herding optimization swarm intelligence POLLUTION
下载PDF
Robust Digital Audio Watermarking Based on SVD and Modified Firefly Algorithm
17
作者 Sayed Afzal Mortaza Rizvi Sanjay Pratap Singh Chauhan 《Journal of Information Security》 2018年第1期1-11,共11页
Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum pos... Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host audio. Firefly Algorithm is used to optimise the modified host audio to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked audio and provide more robustness to the embedded watermark against various attacks such as noise, resampling, filtering attacks etc. 展开更多
关键词 FIREFLY Algorithm (FA) Multiple SCALING Factors (MSF) SINGULAR VALUES Robustness PSNR
下载PDF
Influence of Isotope Effects on Product Polarizations of N(~2D)+D_2, N(~2D)+H_2 and N(~2D)+HD Reactive Systems
18
作者 NIE Shan-shan CHU Tian-shu 《Chemical Research in Chinese Universities》 SCIE CAS CSCD 2012年第5期897-902,共6页
To figure out the influence of isotope effect on product polarizations of the N(2D)+D2 reactive system and its isotope variants, quasi-classical trajectory(QCT) calculation was performed on Ho's potential energy... To figure out the influence of isotope effect on product polarizations of the N(2D)+D2 reactive system and its isotope variants, quasi-classical trajectory(QCT) calculation was performed on Ho's potential energy surface(PES) of 2A″ state. Product polarizations such as product distributions of P(θr), P(φr) and P(θr,φr), as well as the generalized polarization-dependent differential cross sections(PDDCSs) were discussed and compared in detail among the four product channels of the title reactions. Both the intermolecular and intramolecular isotope effects were proved to be influential on product polarizations. 展开更多
关键词 Isotope effect Product polarization Quasi-classical trajectory calculation Potential energy surface
下载PDF
Mobile Application for Research Knowledge Sharing and Dissemination: The Case of Nm-Aist Univeristy Tanzania
19
作者 Justine M. Kemhe Edith T. Luhanga Michael Kisangiri 《Journal of Software Engineering and Applications》 2022年第7期209-219,共11页
The utilization of mobile and web applications has surpassed all other platforms in terms of disseminating researchers’ knowledge among diverse communities throughout the world. The current method of disseminating re... The utilization of mobile and web applications has surpassed all other platforms in terms of disseminating researchers’ knowledge among diverse communities throughout the world. The current method of disseminating researchers’ knowledge to the communities in the Arusha region in Tanzania is through meetings, workshops, and focus group discussions held by researchers, agricultural extension officers and community members after every three months or during field study. Yet the strategy is inefficient and ineffective in practice. The purpose of this study was to determine the most efficient and successful method of disseminating knowledge in communities. The study began with a qualitative phase, utilizing an interpretive technique and a qualitative multiple case study research design. The Arusha region in Tanzania was selected as a case study where different social activities were undertaken, including farming, livestock keeping, tourism activities and fishing. Individual participants were interviewed by using a semi-structured questionnaire. In addition, focus group discussions were conducted to gather more information regarding the needs of the mobile application. Through the implementation of the application, the second phase of the study led to the development of a mobile application that includes community members, agricultural extension officers, and researchers that will enable anyone to install the application on their mobile phones to access knowledge regarding activities undertaken in Arusha. According to the findings of the first phase of the research, a substantial percentage of community members own mobile phones, and hence a mobile application would be sufficient. The research also found that most researcher-community interactions occur at the data collection and intervention assessment (field trials) stages. Hence, the mobile application will benefit community members, district agricultural, irrigation, and cooperative officers (DAICO), and researchers. 展开更多
关键词 Mobile Application Knowledge Sharing Knowledge Dissemination Community Based Participatory Research
下载PDF
Optimally arranged TiO_(2)@MoS_(2) heterostructures with effectively induced built-in electric field for high-performance lithium-sulfur batteries 被引量:1
20
作者 Jeongyoub Lee Changhoon Choi +12 位作者 Jung Been Park Seungho Yu Jinho Ha Hyungsoo Lee Gyumin Jang Young Sun Park Juwon Yun Hayoung Im Subin Moon Soobin Lee Jung-Il Choi Dong-Wan Kim Jooho Moon 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2023年第8期496-508,I0012,共14页
To overcome the serious technological issues affecting lithium-sulfur(Li-S) batteries,such as sluggish sulfur redox kinetics and the detrimental shuttle effect,heterostructure engineering has been investigated as a st... To overcome the serious technological issues affecting lithium-sulfur(Li-S) batteries,such as sluggish sulfur redox kinetics and the detrimental shuttle effect,heterostructure engineering has been investigated as a strategy to effectively capture soluble lithium polysulfide intermediates and promote their conversion reaction by integrating highly polar metal oxides with catalytically active metals sulfides.However,to fully exploit the outstanding properties of heterostructure-based composites,their detailed structure and interfacial contacts should be designed rationally.Herein,optimally arranged TiO_(2)and MoS_(2)-based heterostructures(TiO_(2)@MoS_(2)) are fabricated on carbon cloth as a multifunctional interlayer to efficiently trap polysulfide intermediates and accelerate their redox kinetics.Owing to the synergistic effects between TiO_(2)and MoS_(2)and the uniform heterointerface distribution that induces the ideally oriented built-in electric field,Li-S batteries with TiO_(2)@MoS_(2)interlayers exhibit high rate capability(601 mA h g^(-1)at 5 C),good cycling stability(capacity-fade rate of 0.067% per cycle over 500 cycles at2 C),and satisfactory areal capacity(5.2 mA h cm^(-2)) under an increased sulfur loading of 5.2 mg cm^(-2).Moreover,by comparing with a MoS_(2)@TiO_(2)interlayer composed of reversely arranged heterostructures,the effect of the built-in electric field’s direction on the electrocatalytic reactions of polysulfide intermediates is thoroughly investigated for the first time.The superior electrocatalytic activities of the rationally arranged TiO_(2)@MoS_(2)interlayer demonstrate the importance of optimizing the built-in electric field of heterostructures for producing high-performance Li-S batteries. 展开更多
关键词 Lithium-sulfur batteries Shuttle effect TiO_(2)-MoS_(2)heterostructure engineering Built-in electric field Multifunctional interlayers
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部