Suggested Topics within your search.
Suggested Topics within your search.
-
2301
Privacy-Diffusion: Privacy-Preserving Stable Diffusion Without FHE and Differential Privacy
Published 2025-01-01“…Text-to-image generation is trending in the generative artificial intelligence (GenAI) field. Among open-sourced image generation projects, Stable Diffusion is the state-of-the-art. …”
Get full text
Article -
2302
Knowledge Graph Completion With Pattern-Based Methods
Published 2025-01-01“…In this paper, we propose a Pattern-based Knowledge Graph Completion (PKGC) method that consists of three phases. The first phase utilizes multi-source information and expands the KG using entity description as external information with efficient Natural Language Processing (NLP) techniques. …”
Get full text
Article -
2303
Optimizing the Production of LNG and NGL from Arab Crudes and Wet Gases
Published 1995-01-01“…The developed model should be utilized as a useful tool to help the design of an efficient processing of natural gases. …”
Get full text
Article -
2304
A Novel Method for the Estimation of Sea Surface Wind Speed from SAR Imagery
Published 2024-10-01“…Wind is one of the important environmental factors influencing marine target detection as it is the source of sea clutter and also affects target motion and drift. …”
Get full text
Article -
2305
An Integrated Model for Dam Break Flood Including Reservoir Area, Breach Evolution, and Downstream Flood Propagation
Published 2024-11-01“…The reasonable and efficient prediction of dam failure events is of great significance to the emergency rescue operations and the reduction in dam failure losses. …”
Get full text
Article -
2306
Assessment of Collaboration-Based and Non-Collaboration-Based Logistics Risks with Plithogenic SWARA Method
Published 2021-11-01“…<i>Conclusions</i>: The proposed technique will help logistics professionals make informed decisions and manage and analyze risks more efficiently. This study will also contribute to the literature as it is the first time that logistical risks have been addressed by utilizing the Plithogenic SWARA technique.…”
Get full text
Article -
2307
MULTI-MODEL STACK ENSEMBLE DEEP LEARNING APPROACH FOR MULTI-DISEASE PREDICTION IN HEALTHCARE APPLICATION
Published 2025-03-01“…This paper introduces an innovative method for disease prediction utilizing deep learning, particularly focusing on an ensemblebased multi-disease prediction model. …”
Get full text
Article -
2308
Biometric and IoT Integration for Secure and Remote Door Access Control Using Fingerprint Recognition and GSM Technology
Published 2025-01-01“…The reliability and flexibility of Arduino, coupled with the GSM capabilities of SIM900, are utilized to create a robust and efficient solution. …”
Get full text
Article -
2309
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
Published 2024-09-01“…Due to the critical time constraints in VANETs, efficient batch verification techniques are crucial. …”
Get full text
Article -
2310
Enhancing SR-Tree for Nearest Neighbor Search
Published 2025-01-01“…While dynamic index structures have been extensively utilized for indexing dynamic data, their performance in nearest neighbor search can further be improved. …”
Get full text
Article -
2311
An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion
Published 2025-01-01“…Android’s open-source nature, combined with its large market share, has made it a primary target for malware developers. …”
Get full text
Article -
2312
Advanced computational methods for news classification: A study in neural networks and CNN integrated with GPT
Published 2025-11-01“…This research offers substantial practical contributions, providing detailed insights into news source contributions, effective anomaly detection, and predictive trend analysis using neural networks. …”
Get full text
Article -
2313
Model of the malicious traffic classification based on hypergraph neural network
Published 2023-10-01“…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
Get full text
Article -
2314
AI-Powered Mobile App for Nuclear Cataract Detection
Published 2025-06-01“…The proposed solution utilizes a multi-stage classification approach to analyze ocular images acquired with a slit lamp, sourced from the Nuclear Cataract Database for Biomedical and Machine Learning Applications. …”
Get full text
Article -
2315
Evaluation of Photo-Fenton and Photo-Fenton-Like Methods for Removing Direct Orange 118 Dye from Wastewater
Published 2025-08-01“… Wastewater treatment has used efficient technology methods that can remove any pollutant. …”
Get full text
Article -
2316
User Preferences of Airbnb Accommodation Spatially in The Special Region of Yogyakarta, Indonesia
Published 2025-06-01“…Airbnb's accommodation concept is highly efficient in utilizing unused assets, aligning with SDG Goal 11. …”
Get full text
Article -
2317
THE IMPACT OF CORPORATE SOCIAL RESPONSIBILITY ON BANK PERFORMANCE IN NIGERIA
Published 2025-01-01“…Larger firms generally enjoy higher returns on equity and are more efficient in utilizing their assets to generate returns. …”
Get full text
Article -
2318
High-throughput discovery of perturbation-induced topological magnons
Published 2025-07-01“…In this work, we significantly advance the symmetry-based approach for identifying topological magnons through developing a fully automated algorithm, utilizing the theory of symmetry indicators, that enables a highly efficient and large-scale search for candidate materials hosting perturbation-driven topological magnons. …”
Get full text
Article -
2319
Optimized Extraction of Polyphenols from Kiwifruit Peels and Their Biological Activities
Published 2024-12-01“…This indicates that IR was more efficient in extracting phenolics from kiwi peels. …”
Get full text
Article -
2320
Carbon footprint assessment of livestock farms under tropical conditions: first approximation
Published 2025-06-01“…Abstract This study evaluates the carbon footprint (CF) of livestock farms in the Orellana Province of the Ecuadorian Amazon, focusing on emissions from enteric fermentation, manure management, and energy use. Utilizing Tier I and Tier II methodologies outlined by the IPCC (2006), the research quantifies greenhouse gas (GHG) emissions across three distinct typologies of Agricultural Productive Units (APUs): Conventional Systems (Type 1), Efficient Resource Use (Type 2), and Subsistence and Dependency Systems (Type 3). …”
Get full text
Article