Many datasets in E-commerce have rich information about items and users who purchase or rate them. This information can enable advanced machine learning algorithms to extract and assign user sentiments to various aspe...Many datasets in E-commerce have rich information about items and users who purchase or rate them. This information can enable advanced machine learning algorithms to extract and assign user sentiments to various aspects of the items thus leading to more sophisticated and justifiable recommendations. However, most Collaborative Filtering (CF) techniques rely mainly on the overall preferences of users toward items only. And there is lack of conceptual and computational framework that enables an understandable aspect-based AI approach to recommending items to users. In this paper, we propose concepts and computational tools that can sharpen the logic of recommendations and that rely on users’ sentiments along various aspects of items. These concepts include: The sentiment of a user towards a specific aspect of a specific item, the emphasis that a given user places on a specific aspect in general, the popularity and controversy of an aspect among groups of users, clusters of users emphasizing a given aspect, clusters of items that are popular among a group of users and so forth. The framework introduced in this study is developed in terms of user emphasis, aspect popularity, aspect controversy, and users and items similarity. Towards this end, we introduce the Aspect-Based Collaborative Filtering Toolbox (ABCFT), where the tools are all developed based on the three-index sentiment tensor with the indices being the user, item, and aspect. The toolbox computes solutions to the questions alluded to above. We illustrate the methodology using a hotel review dataset having around 6000 users, 400 hotels and 6 aspects.展开更多
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ...The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.展开更多
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us...Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in cyberattacks.Though the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the victims.In this background,there is a drastic increase observed in the number of phishing emails sent to potential targets.This scenario necessitates the importance of designing an effective classification model.Though numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the literature.The current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)model.The aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing ones.At the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word elimination.Then,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature vectors.Moreover,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing emails.Furthermore,the CS algorithm is used to fine-tune the parameters involved in the GRU model.The performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several dimensions.Extensive comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing approaches.The proposed model achieved a maximum accuracy of 99.72%.展开更多
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t...The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio.展开更多
This investigation is focused on conducting a thorough analysis of Municipal Solid Waste Management (MSWM). MSWM encompasses a range of interdisciplinary measures that govern the various stages involved in managing un...This investigation is focused on conducting a thorough analysis of Municipal Solid Waste Management (MSWM). MSWM encompasses a range of interdisciplinary measures that govern the various stages involved in managing unwanted or non-utilizable solid materials, commonly known as rubbish, trash, junk, refuse, and garbage. These stages include generation, storage, collection, recycling, transportation, handling, disposal, and monitoring. The waste materials mentioned in this context exhibit a wide range of items, such as organic waste from food and vegetables, paper, plastic, polyethylene, iron, tin cans, deceased animals, byproducts from demolition activities, manure, and various other discarded materials. This study aims to provide insights into the possibilities of enhancing solid waste management in the Farmgate area of Dhaka North City Corporation (DNCC). To accomplish this objective, the research examines the conventional waste management methods employed in this area. It conducts extensive field surveys, collecting valuable data through interviews with local residents and key individuals involved in waste management, such as waste collectors, dealers, intermediate dealers, recyclers, and shopkeepers. The results indicate that significant amounts of distinct waste categories are produced daily. These include food and vegetable waste, which amount to 52.1 tons/day;polythene and plastic, which total 4.5 tons/day;metal and tin-can waste, which amounts to 1.4 tons/day;and paper waste, which totals 5.9 tons/day. This study highlights the significance of promoting environmental consciousness to effectively shape the attitudes of urban residents toward waste disposal and management. It emphasizes the need for collaboration between authorities and researchers to improve the current waste management system.展开更多
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network...In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine(DBN-SVM). Sliding window(SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented.Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method's real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions.展开更多
Free transverse vibration of monolayer graphene, boron nitride (BN), and silicon carbide (SiC) sheets is investigated by using molecular dynamics finite element method. Eigenfrequencies and eigenmodes of these three s...Free transverse vibration of monolayer graphene, boron nitride (BN), and silicon carbide (SiC) sheets is investigated by using molecular dynamics finite element method. Eigenfrequencies and eigenmodes of these three sheets in rectangular shape are studied with different aspect ratios with respect to various boundary conditions. It is found that aspect ratios and boundary conditions affect in a similar way on natural frequencies of graphene, BN, and SiC sheets. Natural frequencies in all modes decrease with an increase of the sheet’s size. Graphene exhibits the highest natural frequencies, and SiC sheet possesses the lowest ones. Missing atoms have minor effects on natural frequencies in this study.展开更多
In this paper, we theoretically investigate the effect of noise on the photoionization, the generation of the high-order harmonic and the attosecond pulse irradiated from a model He+ ion. It shows that by properly ad...In this paper, we theoretically investigate the effect of noise on the photoionization, the generation of the high-order harmonic and the attosecond pulse irradiated from a model He+ ion. It shows that by properly adding noise fields, such as Gaussian white noise, random light or colored noise, both the ionization probabilities (IPs) and the harmonic yields can be enhanced by several orders of magnitude. Further, by tuning the noise intensity, a stochastic resonance-like curve is observed, showing the existence of an optimal noise in the ionization enhancement process. Finally, by superposing a properly selected harmonic, an intense attosecond pulse with a duration of 67 as is directly generated.展开更多
The Healthcare monitoring on a clinical base involves many implicit communication between the patient and the care takers. Any misinterpretation leads to adverse effects. A simple wearable system can precisely interpr...The Healthcare monitoring on a clinical base involves many implicit communication between the patient and the care takers. Any misinterpretation leads to adverse effects. A simple wearable system can precisely interpret the implicit communication to the care takers or to an automated support device. Simple and obvious hand movements can be used for the above purpose. The proposed system suggests a novel methodology simpler than the existing sign language interpretations for such implicit communication. The experimental results show a well-distinguished realization of different hand movement activities using a wearable sensor medium and the interpretation results always show significant thresholds.展开更多
The excited-state double-proton transfer (ESDPT) mechanism of 2-amino-3-methoxypyridine and acetic acid com- plex is studied by the density functional theory (DFT) and time-dependent DFT with CAM-B3LYP functional....The excited-state double-proton transfer (ESDPT) mechanism of 2-amino-3-methoxypyridine and acetic acid com- plex is studied by the density functional theory (DFT) and time-dependent DFT with CAM-B3LYP functional. The complex is connected through two different types of inter-molecular hydrogen bonds. After photo-excitation, both hydrogen bonds get strengthened, which can facilitate the ESDPT reaction. The scanned potential energy curve along the proton transfer coordinate indicates that the ESDPT reaction proceeds in a stepwise pattern.展开更多
The effects of two different amino acid catalysts on the stereoselectivities in the direct Mannich reactions of cyclohexanone,p-anisidine and p-nitrobenzaldehyde were studied with the aid of density functional theory....The effects of two different amino acid catalysts on the stereoselectivities in the direct Mannich reactions of cyclohexanone,p-anisidine and p-nitrobenzaldehyde were studied with the aid of density functional theory.Transition states of the stereo-determining C "C bond-forming step with the addition of enamine intermediate to the imine for the L-proline(·-amino acid) and (R)-3-pyrrolidinecarboxylic acid(·-amino acid)-catalyzed processes were reported.B3LYP/6-31G calculations provide a good explanation for the opposite syn vs.anti diastereoselectivities of these two different kinds of catalysts(syn-selectivity for the ·-amino acid catalysts,anti-selectivity for the ·-amino acid catalysts).Calculated and observed diastereomeric ratio and enantiomeric excess values are in reasonable agreement.展开更多
The stereodynamic properties of the F + HO (v, j) reaction are explored by quasi-classical trajectory (QCT) calculations performed on the 1At and 3At potential energy surfaces (PESs). Based on the polarization-...The stereodynamic properties of the F + HO (v, j) reaction are explored by quasi-classical trajectory (QCT) calculations performed on the 1At and 3At potential energy surfaces (PESs). Based on the polarization-dependent differential cross sections (PDDCSs) and the angular distributions of the product angular momentum with the reactant at different values of initial v or j, the results show that the product scattering and product polarization have strong links with initial vibrationalrotational numbers of v and j. The significant manifestation of the normal DCSs is that the forward scattering gradually becomes predominant with the initial vibrational excitation increasing, and the scattering angle of the HF product taking place on the 3At potential energy surface is found to be more sensitive to the initial value of v. The product orientation and alignment are strongly dependent on the initial rovibrational excitation effect. With enhancement in the initial rovibrational excitation effect, there is an overall decrease in the product orientation as well as in the product alignment either perpendicular to the reagent relative velocity vector k or along the direction of the y axis, for which the initial rotational excitation effect is much more noticeable than the vibrational excitation effect. Moreover, the initial rovibrational excitation effect on the product polarization is more pronounced for the 3At potential energy surface than for the 1At potential energy surface.展开更多
In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthca...In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthcare WBANs are the black hole and sink hole attacks.Data from deployed sensor nodes are attracted by sink hole or black hole nodes while grabbing the shortest path.Identifying this issue is quite a challenging task as a small variation in medicine intake may result in a severe illness.This work proposes a hybrid detection framework for attacks by applying a Proportional Coinciding Score(PCS)and an MK-Means algorithm,which is a well-known machine learning technique used to raise attack detection accuracy and decrease computational difficulties while giving treatments for heartache and respiratory issues.First,the gathered training data feature count is reduced through data pre-processing in the PCS.Second,the pre-processed features are sent to the MK-Means algorithm for training the data and promoting classification.Third,certain attack detection measures given by the intrusion detection system,such as the number of data packages trans-received,are identified by the MK-Means algorithm.This study demonstrates that the MK-Means framework yields a high detection accuracy with a low packet loss rate,low communication overhead,and reduced end-to-end delay in the network and improves the accuracy of biomedical data.展开更多
Optimizing the performance of composite structures is a real-world application with significant benefits.In this paper,a high-fidelity finite element method(FEM)is combined with the iterative improvement capability of...Optimizing the performance of composite structures is a real-world application with significant benefits.In this paper,a high-fidelity finite element method(FEM)is combined with the iterative improvement capability of metaheuristic optimization algorithms to obtain optimized composite plates.The FEM module comprises of ninenode isoparametric plate bending element in conjunction with the first-order shear deformation theory(FSDT).A recently proposed memetic version of particle swarm optimization called RPSOLC is modified in the current research to carry out multi-objective Pareto optimization.The performance of the MO-RPSOLC is found to be comparable with the NSGA-III.This work successfully highlights the use of FEM-MO-RPSOLC in obtaining highfidelity Pareto solutions considering simultaneous maximization of the fundamental frequency and frequency separation in laminated composites by optimizing the stacking sequence.展开更多
Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuo...Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented.展开更多
Major fields such as military applications,medical fields,weather forecasting,and environmental applications use wireless sensor networks for major computing processes.Sensors play a vital role in emerging technologie...Major fields such as military applications,medical fields,weather forecasting,and environmental applications use wireless sensor networks for major computing processes.Sensors play a vital role in emerging technologies of the 20th century.Localization of sensors in needed locations is a very serious problem.The environment is home to every living being in the world.The growth of industries after the industrial revolution increased pollution across the environment.Owing to recent uncontrolled growth and development,sensors to measure pollution levels across industries and surroundings are needed.An interesting and challenging task is choosing the place to fit the sensors.Many meta-heuristic techniques have been introduced in node localization.Swarm intelligent algorithms have proven their efficiency in many studies on localization problems.In this article,we introduce an industrial-centric approach to solve the problem of node localization in the sensor network.First,our work aims at selecting industrial areas in the sensed location.We use random forest regression methodology to select the polluted area.Then,the elephant herding algorithm is used in sensor node localization.These two algorithms are combined to produce the best standard result in localizing the sensor nodes.To check the proposed performance,experiments are conducted with data from the KDD Cup 2018,which contain the name of 35 stations with concentrations of air pollutants such as PM,SO_(2),CO,NO_(2),and O_(3).These data are normalized and tested with algorithms.The results are comparatively analyzed with other swarm intelligence algorithms such as the elephant herding algorithm,particle swarm optimization,and machine learning algorithms such as decision tree regression and multi-layer perceptron.Results can indicate our proposed algorithm can suggest more meaningful locations for localizing the sensors in the topology.Our proposed method achieves a lower root mean square value with 0.06 to 0.08 for localizing with Stations 1 to 5.展开更多
Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum pos...Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host audio. Firefly Algorithm is used to optimise the modified host audio to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked audio and provide more robustness to the embedded watermark against various attacks such as noise, resampling, filtering attacks etc.展开更多
To figure out the influence of isotope effect on product polarizations of the N(2D)+D2 reactive system and its isotope variants, quasi-classical trajectory(QCT) calculation was performed on Ho's potential energy...To figure out the influence of isotope effect on product polarizations of the N(2D)+D2 reactive system and its isotope variants, quasi-classical trajectory(QCT) calculation was performed on Ho's potential energy surface(PES) of 2A″ state. Product polarizations such as product distributions of P(θr), P(φr) and P(θr,φr), as well as the generalized polarization-dependent differential cross sections(PDDCSs) were discussed and compared in detail among the four product channels of the title reactions. Both the intermolecular and intramolecular isotope effects were proved to be influential on product polarizations.展开更多
The utilization of mobile and web applications has surpassed all other platforms in terms of disseminating researchers’ knowledge among diverse communities throughout the world. The current method of disseminating re...The utilization of mobile and web applications has surpassed all other platforms in terms of disseminating researchers’ knowledge among diverse communities throughout the world. The current method of disseminating researchers’ knowledge to the communities in the Arusha region in Tanzania is through meetings, workshops, and focus group discussions held by researchers, agricultural extension officers and community members after every three months or during field study. Yet the strategy is inefficient and ineffective in practice. The purpose of this study was to determine the most efficient and successful method of disseminating knowledge in communities. The study began with a qualitative phase, utilizing an interpretive technique and a qualitative multiple case study research design. The Arusha region in Tanzania was selected as a case study where different social activities were undertaken, including farming, livestock keeping, tourism activities and fishing. Individual participants were interviewed by using a semi-structured questionnaire. In addition, focus group discussions were conducted to gather more information regarding the needs of the mobile application. Through the implementation of the application, the second phase of the study led to the development of a mobile application that includes community members, agricultural extension officers, and researchers that will enable anyone to install the application on their mobile phones to access knowledge regarding activities undertaken in Arusha. According to the findings of the first phase of the research, a substantial percentage of community members own mobile phones, and hence a mobile application would be sufficient. The research also found that most researcher-community interactions occur at the data collection and intervention assessment (field trials) stages. Hence, the mobile application will benefit community members, district agricultural, irrigation, and cooperative officers (DAICO), and researchers.展开更多
To overcome the serious technological issues affecting lithium-sulfur(Li-S) batteries,such as sluggish sulfur redox kinetics and the detrimental shuttle effect,heterostructure engineering has been investigated as a st...To overcome the serious technological issues affecting lithium-sulfur(Li-S) batteries,such as sluggish sulfur redox kinetics and the detrimental shuttle effect,heterostructure engineering has been investigated as a strategy to effectively capture soluble lithium polysulfide intermediates and promote their conversion reaction by integrating highly polar metal oxides with catalytically active metals sulfides.However,to fully exploit the outstanding properties of heterostructure-based composites,their detailed structure and interfacial contacts should be designed rationally.Herein,optimally arranged TiO_(2)and MoS_(2)-based heterostructures(TiO_(2)@MoS_(2)) are fabricated on carbon cloth as a multifunctional interlayer to efficiently trap polysulfide intermediates and accelerate their redox kinetics.Owing to the synergistic effects between TiO_(2)and MoS_(2)and the uniform heterointerface distribution that induces the ideally oriented built-in electric field,Li-S batteries with TiO_(2)@MoS_(2)interlayers exhibit high rate capability(601 mA h g^(-1)at 5 C),good cycling stability(capacity-fade rate of 0.067% per cycle over 500 cycles at2 C),and satisfactory areal capacity(5.2 mA h cm^(-2)) under an increased sulfur loading of 5.2 mg cm^(-2).Moreover,by comparing with a MoS_(2)@TiO_(2)interlayer composed of reversely arranged heterostructures,the effect of the built-in electric field’s direction on the electrocatalytic reactions of polysulfide intermediates is thoroughly investigated for the first time.The superior electrocatalytic activities of the rationally arranged TiO_(2)@MoS_(2)interlayer demonstrate the importance of optimizing the built-in electric field of heterostructures for producing high-performance Li-S batteries.展开更多
文摘Many datasets in E-commerce have rich information about items and users who purchase or rate them. This information can enable advanced machine learning algorithms to extract and assign user sentiments to various aspects of the items thus leading to more sophisticated and justifiable recommendations. However, most Collaborative Filtering (CF) techniques rely mainly on the overall preferences of users toward items only. And there is lack of conceptual and computational framework that enables an understandable aspect-based AI approach to recommending items to users. In this paper, we propose concepts and computational tools that can sharpen the logic of recommendations and that rely on users’ sentiments along various aspects of items. These concepts include: The sentiment of a user towards a specific aspect of a specific item, the emphasis that a given user places on a specific aspect in general, the popularity and controversy of an aspect among groups of users, clusters of users emphasizing a given aspect, clusters of items that are popular among a group of users and so forth. The framework introduced in this study is developed in terms of user emphasis, aspect popularity, aspect controversy, and users and items similarity. Towards this end, we introduce the Aspect-Based Collaborative Filtering Toolbox (ABCFT), where the tools are all developed based on the three-index sentiment tensor with the indices being the user, item, and aspect. The toolbox computes solutions to the questions alluded to above. We illustrate the methodology using a hotel review dataset having around 6000 users, 400 hotels and 6 aspects.
基金supported by project TRANSACT funded under H2020-EU.2.1.1.-INDUSTRIAL LEADERSHIP-Leadership in Enabling and Industrial Technologies-Information and Communication Technologies(Grant Agreement ID:101007260).
文摘The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
基金This research was supported in part by Basic Science Research Program through the National Research Foundation of Korea(NRF),funded by the Ministry of Education(NRF-2021R1A6A1A03039493)in part by the NRF grant funded by the Korea government(MSIT)(NRF-2022R1A2C1004401).
文摘Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in cyberattacks.Though the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the victims.In this background,there is a drastic increase observed in the number of phishing emails sent to potential targets.This scenario necessitates the importance of designing an effective classification model.Though numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the literature.The current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)model.The aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing ones.At the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word elimination.Then,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature vectors.Moreover,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing emails.Furthermore,the CS algorithm is used to fine-tune the parameters involved in the GRU model.The performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several dimensions.Extensive comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing approaches.The proposed model achieved a maximum accuracy of 99.72%.
文摘The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio.
文摘This investigation is focused on conducting a thorough analysis of Municipal Solid Waste Management (MSWM). MSWM encompasses a range of interdisciplinary measures that govern the various stages involved in managing unwanted or non-utilizable solid materials, commonly known as rubbish, trash, junk, refuse, and garbage. These stages include generation, storage, collection, recycling, transportation, handling, disposal, and monitoring. The waste materials mentioned in this context exhibit a wide range of items, such as organic waste from food and vegetables, paper, plastic, polyethylene, iron, tin cans, deceased animals, byproducts from demolition activities, manure, and various other discarded materials. This study aims to provide insights into the possibilities of enhancing solid waste management in the Farmgate area of Dhaka North City Corporation (DNCC). To accomplish this objective, the research examines the conventional waste management methods employed in this area. It conducts extensive field surveys, collecting valuable data through interviews with local residents and key individuals involved in waste management, such as waste collectors, dealers, intermediate dealers, recyclers, and shopkeepers. The results indicate that significant amounts of distinct waste categories are produced daily. These include food and vegetable waste, which amount to 52.1 tons/day;polythene and plastic, which total 4.5 tons/day;metal and tin-can waste, which amounts to 1.4 tons/day;and paper waste, which totals 5.9 tons/day. This study highlights the significance of promoting environmental consciousness to effectively shape the attitudes of urban residents toward waste disposal and management. It emphasizes the need for collaboration between authorities and researchers to improve the current waste management system.
基金supported by the National Key Research and Development Program of China(2017YFB1401300,2017YFB1401304)the National Natural Science Foundation of China(61702211,L1724007,61902203)+3 种基金Hubei Provincial Science and Technology Program of China(2017AKA191)the Self-Determined Research Funds of Central China Normal University(CCNU)from the Colleges’Basic Research(CCNU17QD0004,CCNU17GF0002)the Natural Science Foundation of Shandong Province(ZR2017QF015)the Key Research and Development Plan–Major Scientific and Technological Innovation Projects of Shandong Province(2019JZZY020101)。
文摘In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine(DBN-SVM). Sliding window(SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented.Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method's real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions.
文摘Free transverse vibration of monolayer graphene, boron nitride (BN), and silicon carbide (SiC) sheets is investigated by using molecular dynamics finite element method. Eigenfrequencies and eigenmodes of these three sheets in rectangular shape are studied with different aspect ratios with respect to various boundary conditions. It is found that aspect ratios and boundary conditions affect in a similar way on natural frequencies of graphene, BN, and SiC sheets. Natural frequencies in all modes decrease with an increase of the sheet’s size. Graphene exhibits the highest natural frequencies, and SiC sheet possesses the lowest ones. Missing atoms have minor effects on natural frequencies in this study.
基金Project supported by the National Natural Science Foundations of China(Grant Nos.10874096 and 20633070)
文摘In this paper, we theoretically investigate the effect of noise on the photoionization, the generation of the high-order harmonic and the attosecond pulse irradiated from a model He+ ion. It shows that by properly adding noise fields, such as Gaussian white noise, random light or colored noise, both the ionization probabilities (IPs) and the harmonic yields can be enhanced by several orders of magnitude. Further, by tuning the noise intensity, a stochastic resonance-like curve is observed, showing the existence of an optimal noise in the ionization enhancement process. Finally, by superposing a properly selected harmonic, an intense attosecond pulse with a duration of 67 as is directly generated.
文摘The Healthcare monitoring on a clinical base involves many implicit communication between the patient and the care takers. Any misinterpretation leads to adverse effects. A simple wearable system can precisely interpret the implicit communication to the care takers or to an automated support device. Simple and obvious hand movements can be used for the above purpose. The proposed system suggests a novel methodology simpler than the existing sign language interpretations for such implicit communication. The experimental results show a well-distinguished realization of different hand movement activities using a wearable sensor medium and the interpretation results always show significant thresholds.
文摘The excited-state double-proton transfer (ESDPT) mechanism of 2-amino-3-methoxypyridine and acetic acid com- plex is studied by the density functional theory (DFT) and time-dependent DFT with CAM-B3LYP functional. The complex is connected through two different types of inter-molecular hydrogen bonds. After photo-excitation, both hydrogen bonds get strengthened, which can facilitate the ESDPT reaction. The scanned potential energy curve along the proton transfer coordinate indicates that the ESDPT reaction proceeds in a stepwise pattern.
基金Supported by the National Natural Science Foundation of China(Nos.20773071,20901043)the Natural Science Foundation of Shandong Province,China(No.ZR2010BM024)the Project of Shandong Province Higher Educational Science and Technology Program,China(No.J10LB06)
文摘The effects of two different amino acid catalysts on the stereoselectivities in the direct Mannich reactions of cyclohexanone,p-anisidine and p-nitrobenzaldehyde were studied with the aid of density functional theory.Transition states of the stereo-determining C "C bond-forming step with the addition of enamine intermediate to the imine for the L-proline(·-amino acid) and (R)-3-pyrrolidinecarboxylic acid(·-amino acid)-catalyzed processes were reported.B3LYP/6-31G calculations provide a good explanation for the opposite syn vs.anti diastereoselectivities of these two different kinds of catalysts(syn-selectivity for the ·-amino acid catalysts,anti-selectivity for the ·-amino acid catalysts).Calculated and observed diastereomeric ratio and enantiomeric excess values are in reasonable agreement.
基金supported by the National Natural Science Foundation of China (Grant Nos. 10874096 and 20633070)the Natural Science Foundation of Qingdao University,China (Grant No. 063-06300510)
文摘The stereodynamic properties of the F + HO (v, j) reaction are explored by quasi-classical trajectory (QCT) calculations performed on the 1At and 3At potential energy surfaces (PESs). Based on the polarization-dependent differential cross sections (PDDCSs) and the angular distributions of the product angular momentum with the reactant at different values of initial v or j, the results show that the product scattering and product polarization have strong links with initial vibrationalrotational numbers of v and j. The significant manifestation of the normal DCSs is that the forward scattering gradually becomes predominant with the initial vibrational excitation increasing, and the scattering angle of the HF product taking place on the 3At potential energy surface is found to be more sensitive to the initial value of v. The product orientation and alignment are strongly dependent on the initial rovibrational excitation effect. With enhancement in the initial rovibrational excitation effect, there is an overall decrease in the product orientation as well as in the product alignment either perpendicular to the reagent relative velocity vector k or along the direction of the y axis, for which the initial rotational excitation effect is much more noticeable than the vibrational excitation effect. Moreover, the initial rovibrational excitation effect on the product polarization is more pronounced for the 3At potential energy surface than for the 1At potential energy surface.
基金funded by Stefan cel Mare University of Suceava,Romania.
文摘In Wireless Body Area Networks(WBANs)with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthcare WBANs are the black hole and sink hole attacks.Data from deployed sensor nodes are attracted by sink hole or black hole nodes while grabbing the shortest path.Identifying this issue is quite a challenging task as a small variation in medicine intake may result in a severe illness.This work proposes a hybrid detection framework for attacks by applying a Proportional Coinciding Score(PCS)and an MK-Means algorithm,which is a well-known machine learning technique used to raise attack detection accuracy and decrease computational difficulties while giving treatments for heartache and respiratory issues.First,the gathered training data feature count is reduced through data pre-processing in the PCS.Second,the pre-processed features are sent to the MK-Means algorithm for training the data and promoting classification.Third,certain attack detection measures given by the intrusion detection system,such as the number of data packages trans-received,are identified by the MK-Means algorithm.This study demonstrates that the MK-Means framework yields a high detection accuracy with a low packet loss rate,low communication overhead,and reduced end-to-end delay in the network and improves the accuracy of biomedical data.
文摘Optimizing the performance of composite structures is a real-world application with significant benefits.In this paper,a high-fidelity finite element method(FEM)is combined with the iterative improvement capability of metaheuristic optimization algorithms to obtain optimized composite plates.The FEM module comprises of ninenode isoparametric plate bending element in conjunction with the first-order shear deformation theory(FSDT).A recently proposed memetic version of particle swarm optimization called RPSOLC is modified in the current research to carry out multi-objective Pareto optimization.The performance of the MO-RPSOLC is found to be comparable with the NSGA-III.This work successfully highlights the use of FEM-MO-RPSOLC in obtaining highfidelity Pareto solutions considering simultaneous maximization of the fundamental frequency and frequency separation in laminated composites by optimizing the stacking sequence.
文摘Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously, giving rise to a Doppler power spectral density (DPSD) that varies from one observation instant to the next. This paper is concerned with dynamical modeling of time-varying wireless fading channels, their estimation and parameter identification, and optimal power control from received signal measurement data. The wireless channel is characterized using a stochastic state-space form and derived by approximating the time-varying DPSD of the channel. The expected maximization and Kalman filter are employed to recursively identify and estimate the channel parameters and states, respectively, from online received signal strength measured data. Moreover, we investigate a centralized optimal power control algorithm based on predictable strategies and employing the estimated channel parameters and states. The proposed models together with the estimation and power control algorithms are tested using experimental measurement data and the results are presented.
文摘Major fields such as military applications,medical fields,weather forecasting,and environmental applications use wireless sensor networks for major computing processes.Sensors play a vital role in emerging technologies of the 20th century.Localization of sensors in needed locations is a very serious problem.The environment is home to every living being in the world.The growth of industries after the industrial revolution increased pollution across the environment.Owing to recent uncontrolled growth and development,sensors to measure pollution levels across industries and surroundings are needed.An interesting and challenging task is choosing the place to fit the sensors.Many meta-heuristic techniques have been introduced in node localization.Swarm intelligent algorithms have proven their efficiency in many studies on localization problems.In this article,we introduce an industrial-centric approach to solve the problem of node localization in the sensor network.First,our work aims at selecting industrial areas in the sensed location.We use random forest regression methodology to select the polluted area.Then,the elephant herding algorithm is used in sensor node localization.These two algorithms are combined to produce the best standard result in localizing the sensor nodes.To check the proposed performance,experiments are conducted with data from the KDD Cup 2018,which contain the name of 35 stations with concentrations of air pollutants such as PM,SO_(2),CO,NO_(2),and O_(3).These data are normalized and tested with algorithms.The results are comparatively analyzed with other swarm intelligence algorithms such as the elephant herding algorithm,particle swarm optimization,and machine learning algorithms such as decision tree regression and multi-layer perceptron.Results can indicate our proposed algorithm can suggest more meaningful locations for localizing the sensors in the topology.Our proposed method achieves a lower root mean square value with 0.06 to 0.08 for localizing with Stations 1 to 5.
文摘Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host audio. Firefly Algorithm is used to optimise the modified host audio to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked audio and provide more robustness to the embedded watermark against various attacks such as noise, resampling, filtering attacks etc.
基金Supported by the National Natural Science Foundation of China(No.10874096)
文摘To figure out the influence of isotope effect on product polarizations of the N(2D)+D2 reactive system and its isotope variants, quasi-classical trajectory(QCT) calculation was performed on Ho's potential energy surface(PES) of 2A″ state. Product polarizations such as product distributions of P(θr), P(φr) and P(θr,φr), as well as the generalized polarization-dependent differential cross sections(PDDCSs) were discussed and compared in detail among the four product channels of the title reactions. Both the intermolecular and intramolecular isotope effects were proved to be influential on product polarizations.
文摘The utilization of mobile and web applications has surpassed all other platforms in terms of disseminating researchers’ knowledge among diverse communities throughout the world. The current method of disseminating researchers’ knowledge to the communities in the Arusha region in Tanzania is through meetings, workshops, and focus group discussions held by researchers, agricultural extension officers and community members after every three months or during field study. Yet the strategy is inefficient and ineffective in practice. The purpose of this study was to determine the most efficient and successful method of disseminating knowledge in communities. The study began with a qualitative phase, utilizing an interpretive technique and a qualitative multiple case study research design. The Arusha region in Tanzania was selected as a case study where different social activities were undertaken, including farming, livestock keeping, tourism activities and fishing. Individual participants were interviewed by using a semi-structured questionnaire. In addition, focus group discussions were conducted to gather more information regarding the needs of the mobile application. Through the implementation of the application, the second phase of the study led to the development of a mobile application that includes community members, agricultural extension officers, and researchers that will enable anyone to install the application on their mobile phones to access knowledge regarding activities undertaken in Arusha. According to the findings of the first phase of the research, a substantial percentage of community members own mobile phones, and hence a mobile application would be sufficient. The research also found that most researcher-community interactions occur at the data collection and intervention assessment (field trials) stages. Hence, the mobile application will benefit community members, district agricultural, irrigation, and cooperative officers (DAICO), and researchers.
基金supported by the National R&D Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (2018M3D1A1058793 and 2021R1A3B1068920)supported by the Creative Materials Discovery Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (2018M3D1A1058744)the Yonsei Signature Research Cluster Program of 2021 (2021-22-0002)。
文摘To overcome the serious technological issues affecting lithium-sulfur(Li-S) batteries,such as sluggish sulfur redox kinetics and the detrimental shuttle effect,heterostructure engineering has been investigated as a strategy to effectively capture soluble lithium polysulfide intermediates and promote their conversion reaction by integrating highly polar metal oxides with catalytically active metals sulfides.However,to fully exploit the outstanding properties of heterostructure-based composites,their detailed structure and interfacial contacts should be designed rationally.Herein,optimally arranged TiO_(2)and MoS_(2)-based heterostructures(TiO_(2)@MoS_(2)) are fabricated on carbon cloth as a multifunctional interlayer to efficiently trap polysulfide intermediates and accelerate their redox kinetics.Owing to the synergistic effects between TiO_(2)and MoS_(2)and the uniform heterointerface distribution that induces the ideally oriented built-in electric field,Li-S batteries with TiO_(2)@MoS_(2)interlayers exhibit high rate capability(601 mA h g^(-1)at 5 C),good cycling stability(capacity-fade rate of 0.067% per cycle over 500 cycles at2 C),and satisfactory areal capacity(5.2 mA h cm^(-2)) under an increased sulfur loading of 5.2 mg cm^(-2).Moreover,by comparing with a MoS_(2)@TiO_(2)interlayer composed of reversely arranged heterostructures,the effect of the built-in electric field’s direction on the electrocatalytic reactions of polysulfide intermediates is thoroughly investigated for the first time.The superior electrocatalytic activities of the rationally arranged TiO_(2)@MoS_(2)interlayer demonstrate the importance of optimizing the built-in electric field of heterostructures for producing high-performance Li-S batteries.