Suggested Topics within your search.
Suggested Topics within your search.
-
2141
An Integrated Model for Dam Break Flood Including Reservoir Area, Breach Evolution, and Downstream Flood Propagation
Published 2024-11-01“…It is coupled with a multi-architecture (multi-CPU and GPU) open-source two-dimensional flood model, which is based on high-precision terrain and land use data. …”
Get full text
Article -
2142
Assessment of Collaboration-Based and Non-Collaboration-Based Logistics Risks with Plithogenic SWARA Method
Published 2021-11-01“…<i>Conclusions</i>: The proposed technique will help logistics professionals make informed decisions and manage and analyze risks more efficiently. This study will also contribute to the literature as it is the first time that logistical risks have been addressed by utilizing the Plithogenic SWARA technique.…”
Get full text
Article -
2143
Biometric and IoT Integration for Secure and Remote Door Access Control Using Fingerprint Recognition and GSM Technology
Published 2025-01-01“…The reliability and flexibility of Arduino, coupled with the GSM capabilities of SIM900, are utilized to create a robust and efficient solution. …”
Get full text
Article -
2144
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
Published 2024-09-01“…This necessitates secure transmission, which requires guarantees of message availability, integrity, source authenticity, and user privacy. Moreover, the traceability of network participants is essential as it deters malicious actors and allows lawful authorities to identify message senders for accountability. …”
Get full text
Article -
2145
Enhancing SR-Tree for Nearest Neighbor Search
Published 2025-01-01“…This work also provides an open-source implementation of our enhancements to SR-Tree for the Rust ecosystem.…”
Get full text
Article -
2146
An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion
Published 2025-01-01“…Android’s open-source nature, combined with its large market share, has made it a primary target for malware developers. …”
Get full text
Article -
2147
Advanced computational methods for news classification: A study in neural networks and CNN integrated with GPT
Published 2025-11-01“…This research offers substantial practical contributions, providing detailed insights into news source contributions, effective anomaly detection, and predictive trend analysis using neural networks. …”
Get full text
Article -
2148
Model of the malicious traffic classification based on hypergraph neural network
Published 2023-10-01“…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
Get full text
Article -
2149
Evaluation of Photo-Fenton and Photo-Fenton-Like Methods for Removing Direct Orange 118 Dye from Wastewater
Published 2025-08-01“… Wastewater treatment has used efficient technology methods that can remove any pollutant. …”
Get full text
Article -
2150
High-throughput discovery of perturbation-induced topological magnons
Published 2025-07-01“…In this work, we significantly advance the symmetry-based approach for identifying topological magnons through developing a fully automated algorithm, utilizing the theory of symmetry indicators, that enables a highly efficient and large-scale search for candidate materials hosting perturbation-driven topological magnons. …”
Get full text
Article -
2151
Lithium niobate on insulator: an emerging nanophotonic crystal for optimized light control
Published 2024-11-01“…A high refractive index and non-linear optical and electro-optical properties enable LN to be used for more efficient manipulation of light. The highly reflective quarternary stack can play an important role in diverse fields such as photonics, optomechanics, optoelectronics, signal processing, and quantum technologies, spanning the spectrum from photon generation (including single-photon sources and lasers) to their manipulation (encompassing waveguiding, beam splitting, filters, and spin–photon entanglement), and detection (involving single-photon detectors).…”
Get full text
Article -
2152
Inverse design of 3D nanophotonic devices with structural integrity using auxiliary thermal solvers
Published 2025-04-01“…Gradient-based optimization offers an efficient approach to design these complex and non-intuitive structures. …”
Get full text
Article -
2153
Innovative BWM–TOPSIS-based approach to determine the optimum delivery method for offshore projects
Published 2025-04-01“…Abstract Offshore projects hold significant importance in the construction industry by fostering innovation, enabling large-scale infrastructure development, and supporting the expansion of renewable energy sources, enhancing global energy security and economic stability. …”
Get full text
Article -
2154
A Contrast-Enhanced Approach for Aerial Moving Target Detection Based on Distributed Satellites
Published 2025-03-01“…However, target detection is restricted by radiation sources since IOs are often uncontrollable. To address this, we utilize satellite radars operating in an active self-transmitting and self-receiving mode for controllability. …”
Get full text
Article -
2155
An Advanced Recomposition-Based Displaying Technique: Maximizing Image Reconstruction for Virtual Museum Applications
Published 2025-01-01“…The time-sensitive feature selection utilizes the BING objectness metric to identify and prioritize the most relevant features from multimodal data sources, ensuring efficient extraction and preserving exhibit content. …”
Get full text
Article -
2156
Semantic Web in Healthcare: A Systematic Literature Review of Application, Research Gap, and Future Research Avenues
Published 2022-01-01“…However, the key challenge in reaching this ambitious goal is letting the information exchange across heterogeneous sources and methods as well as establishing efficient tools and techniques. …”
Get full text
Article -
2157
ESTIMATING THE DEMAND FOR RAILWAY FREIGHT TRANSPORTATION: A CASE STUDY IN KAZAKHSTAN
Published 2023-09-01“…The current case study specifically examines the National Company Kazakhstan Temir Zholy (KTZ), a transport and logistics holding engaged in rail transportation in Kazakhstan. KTZ’s main sources of income are related to freight transportation. …”
Get full text
Article -
2158
Country-Level Bibliometric Analysis of Edible Insect Research: Geographic Distribution and Contributions to Advancing Sustainable Alternatives for Food and Feed
Published 2025-01-01“…Insects like black soldier fly larvae, crickets, and mealworms are being explored as efficient protein sources for animal feed. Addressing food safety, allergenicity, and cultural barriers remains critical. …”
Get full text
Article -
2159
A novel and rapid method to purify the human complement opsonin C3b from human plasma
Published 2025-08-01“…Therefore, we developed a rapid (three days) and efficient method that purifies C3b directly from blood sources, requiring fewer steps and reagents than previously published protocols. …”
Get full text
Article -
2160
Comparative analysis of geothermal binary ORC systems: performance and environmental considerations for CO2 andwater as geofluids
Published 2024-03-01“…This study considers the process simulation of geothermal binary Organic Rankine Cycle (ORC) systems which utilizes CO2 and water as geofluids for electricity generation. …”
Get full text
Article