139 research outputs found
Recommended from our members
Ensemble methods for instance-based Arabic language authorship attribution
The Authorship Attribution (AA) is considered as a subfield of authorship analysis and it is an important problem as the range of anonymous information increased with fast growing of internet usage worldwide. In other languages such as English, Spanish and Chinese, such issue is quite well studied. However, in Arabic language, the AA problem has received less attention from the research community due to complexity and nature of Arabic sentences. The paper presented an intensive review on previous studies for Arabic language. Based on that, this study has employed the Technique for Order Preferences by Similarity to Ideal Solution (TOPSIS) method to choose the base classifier of the ensemble methods. In terms of attribution features, hundreds of stylometric features and distinct words using several tools have been extracted. Then, Adaboost and Bagging ensemble methods have been applied on Arabic enquires (Fatwa) dataset. The findings showed an improvement of the effectiveness of the authorship attribution task in the Arabic language
A novel population-based local search for nurse rostering problem
Population-based approaches regularly are better than single based (local search) approaches in exploring the search space. However, the drawback of population-based approaches is in exploiting the search space. Several hybrid approaches have proven their efficiency through different domains of optimization problems by incorporating and integrating the strength of population and local search approaches. Meanwhile, hybrid methods have a drawback of increasing the parameter tuning. Recently, population-based local search was proposed for a university course-timetabling problem with fewer parameters than existing approaches, the proposed approach proves its effectiveness. The proposed approach employs two operators to intensify and diversify the search space. The first operator is applied to a single solution, while the second is applied for all solutions. This paper aims to investigate the performance of population-based local search for the nurse rostering problem. The INRC2010 database with a dataset composed of 69 instances is used to test the performance of PB-LS. A comparison was made between the performance of PB-LS and other existing approaches in the literature. Results show good performances of proposed approach compared to other approaches, where population-based local search provided best results in 55 cases over 69 instances used in experiments
Late Maastrichtian carbon isotope stratigraphy and cyclostratigraphy of the Newfoundland Margin (Site U1403, IODP Expedition 342)
Earth’s climate during the Maastrichtian (latest Cretaceous) was punctuated by brief warming and cooling episodes, accompanied by perturbations of the global carbon cycle. Superimposed on a long-term cooling trend, the middle Maastrichtian is characterized by deep-sea warming and relatively high values of stable carbon-isotope ratios, followed by strong climatic variability towards the end of the Cretaceous. A lack of knowledge on the timing of climatic change inhibits our understanding of underlying causal mechanisms. We present an integrated stratigraphy from Integrated Ocean Drilling Program (IODP) Site U1403, providing an expanded deep ocean record from the North Atlantic (Expedition 342, Newfoundland Margin). Distinct sedimentary cyclicity suggests that orbital forcing played a major role in depositional processes, which is confirmed by statistical analyses of high resolution elemental data obtained by X-ray fluorescence (XRF) core scanning. Astronomical calibration reveals that the investigated interval encompasses seven 405-kyr cycles (Ma4051 to Ma4057) and spans the 2.8 Myr directly preceding the Cretaceous/Paleocene (K/Pg) boundary. A high-resolution carbon-isotope record from bulk carbonates allows us to identify global trends in the late Maastrichtian carbon cycle. Low-amplitude variations (up to 0.4‰) in carbon isotopes at Site U1403 match similar scale variability in records from Tethyan and Pacific open-ocean sites. Comparison between Site U1403 and the hemipelagic restricted basin of the Zumaia section (northern Spain), with its own well-established independent cyclostratigraphic framework, is more complex. Whereas the pre-K/Pg oscillations and the negative values of the Mid-Maastrichtian Event (MME) can be readily discerned in both the Zumaia and U1403 records, patterns diverge during a ~ 1 Myr period in the late Maastrichtian (67.8–66.8 Ma), with Site U1403 more reliably reflecting global carbon cycling. Our new carbon isotope record and cyclostratigraphy offer promise for Site U1403 to serve as a future reference section for high-resolution studies of late Maastrichtian paleoclimatic change
Simulation de l'effet des surcharges sur le comportement mécanique des P.T.H à couples de matériaux différents
International audienceThe reliability of total hip arthroplasties (THA) is not any more to show. It is allowed by all. Indeed, the retreat of such interventions exceeds now fifteen years and the hopes which the first clinicians formulated are now realities. Nevertheless, the deformation and the wear of cup components remain an inevitable mechanism and loosening appear in long-term. Prevention of loosening passes by the reduction of this wear. This study deals with a simulation of the effect of overloads on THA with different materials. Three materials are analyzed in order to choose the couple which has better bio functionality.La fiabilité des arthroplasties totales de hanche n'est plus à démontrer. Elle est admise par tous. En effet, le recul de telles interventions dépasse maintenant quinze ans et les espérances que les premiers cliniciens ont formulées à leur égard sont maintenant des réalités. Néanmoins, la déformation et l'usure des composants acétabulaires restent un mécanisme inévitable et des descellements asceptiques apparaissent à long terme. La prévention du descellement passe donc par la réduction de cette usure. Cette étude porte sur une simulation de l'effet de certains paramètres mécaniques, entre autres « les surcharges » sur le comportement des PTH hybrides à couples de matériaux différents. Trois couples de matériaux sont analysés, en vue de choisir celui qui offre une meilleure biofonctionnalité
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring
With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose serious privacy concerns and cybersecurity threats. Eavesdroppers can easily access confidential multimedia information and the privacy of individuals can be compromised. As a solution, novel encryption techniques for the multimedia data concealing have been proposed by the cryptographers. Due to the bandwidth limitations and computational complexity, traditional encryption methods are not applicable to multimedia data. In traditional encryption methods such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES), once multimedia data are compressed during encryption, correct decryption is a challenging task. In order to utilize the available bandwidth in an efficient way, a novel secure video occupancy monitoring method in conjunction with encryption-compression has been developed and reported in this paper. The interesting properties of Chebyshev map, intertwining map, logistic map, and orthogonal matrix are exploited during block permutation, substitution, and diffusion processes, respectively. Real-time simulation and performance results of the proposed system show that the proposed scheme is highly sensitive to the initial seed parameters. In comparison to other traditional schemes, the proposed encryption system is secure, efficient, and robust for data encryption. Security parameters such as correlation coefficient, entropy, contrast, energy, and higher key space prove the robustness and efficiency of the proposed solution
UAVs and Blockchain Synergy: Enabling Secure Reputation-based Federated Learning in Smart Cities
Unmanned aerial vehicles (UAVs) can be used as drones’ edge Intelligence to assist with data collection, training models, and communication over wireless networks. UAV use for smart cities is rapidly growing in various industries, including tracking and surveillance, military defense, managing healthcare delivery, wireless communications, and more. In traditional machine learning techniques, an enormous amount of sensor data from UAVs must be shared to central storage to perform model training, which poses serious privacy risks and risks of misuse of information. The federated learning technique (FL), which can be applied to UAVs, is a promising means of collaboratively training a global model while retaining local access to sensitive raw data. Despite this, FL is a significant communication burden for battery-constrained UAVs due to local model training and global synchronization frequency. In this article, we address the major challenges associated with UAV-based FL for smart cities, including single-point failure, privacy leakage, scalability, and global model verification. To tackle these challenges, we present a differentially private federated learning framework based on Accumulative Reputation-based Selection (ARS) for the edge-aided UAV network that utilizes blockchains to prevent single-point failures where we switched from central control to decentralized control, Interplanetary File System (IPFS) for off-chain model storage and their respective hash-keys on-chain to ensure model integrity. Due to IPFS, the size of the blockchain will be reduced, and local differential privacy will be applied to prevent privacy leakages. In the proposed framework, an aggregator will be selected based on its ARS score and model verification by the validators. After most validators approve it, it will be available for use. Several parameters are taken into consideration during evaluation, including accuracy, precision, recall, F1-score, and time consumption. It also evaluates the number of edge computers vs test accuracy, the number of edge computers vs time consumption for global model convergence, and the number of rounds vs test accuracy. This is done by considering two benchmark datasets: MNIST and CIFAR-10. The results show that the proposed work preserves privacy while achieving high accuracy. Moreover, it is scalable to accommodate many participants
TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks
The Internet of Things (IoT) is a global network that connects a large number of smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to-machine communication, widely adopted in IoT networks. Various smart devices within these networks are employed to handle sensitive information. However, the scale and openness of IoT networks make them highly vulnerable to security breaches and attacks, such as eavesdropping, weak authentication, and malicious payloads. Hence, there is a need for advanced machine learning (ML) and deep learning (DL)-based intrusion detection systems (IDS). Existing ML-based IoT-IDSs face several limitations in effectively detecting malicious activities, mainly due to imbalanced training data. To address this, this study introduces a transformer neural network-based intrusion detection system (TNN-IDS) specifically designed for MQTT-enabled IoT networks. The proposed approach aims to enhance the detection of malicious activities within these networks. The TNN-IDS leverages the parallel processing capability of the Transformer Neural Network, which accelerates the learning process and results in improved detection of malicious attacks. To evaluate the performance of the proposed system, it was compared with various IDSs based on ML and DL approaches. The experimental results demonstrate that the proposed TNN-IDS outperforms other systems in terms of detecting malicious activity. The TNN-IDS achieved optimum accuracies reaching 99.9% in detecting malicious activities
- …