-
14941
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. …”
Get full text
Article -
14942
Experimental Characterisation of the Interfacial Structure during Counter-Current Flow Limitation in a Model of the Hot Leg of a PWR
Published 2012-01-01“…The structure of the interface was observed from the side of the channel test section using a high-speed video camera. An algorithm was developed to recognise the stratified interface in the camera frames after background subtraction. …”
Get full text
Article -
14943
Fast Detection of Deceptive Reviews by Combining the Time Series and Machine Learning
Published 2021-01-01“…Secondly, a co-training two-view semisupervised learning algorithm was performed in each captured interval, in which linguistic cues, metadata, and user purchase behaviors were synthetically employed to classify the reviews and check whether they are spam ones or not. …”
Get full text
Article -
14944
Advanced Text Summarization Model Incorporating NLP Techniques and Feature-Based Scoring
Published 2025-01-01“…This study’s summarization algorithm was tested using the CNN, XSum and BBC Summarization datasets, which aggregate documents from different areas. …”
Get full text
Article -
14945
ANALYSIS OF THE PRESSURE DISTRIBUTION ON RAIL SEAT OF CONCRETE SLEEPERS UNDER 40- TONNE AXLE LOAD
Published 2016-01-01“…The FE model is first validated by comparing the calculated results with those of a traditional simplified algorithm. More results have shown that( 1) the typical heavy haul track structure in China can meet the requirements of 40- tonne axle load,but the stress on the top of subgrade exceeds the bearing capacity considered in normal design;( 2) with the increase of the lateral wheel-rail contact force,the width( along the lateral) of the contact patch between the railpad and the sleeper decreases and the length keeps almost unchanged,thereby the maximum pressure increases and its location moves towards the field side in the lateral;( 3) Under the typical wheel-rail contact forces,the pressure distribution on the rail seat changes significantly when the stiffness of the railpad increases from 80 MN / m to 200 MN / m,while un-affected as the stiffness further increases to 1300 MN / m;( 4) Assuming a constant dynamic amplification factor,the pressure on the rail seat decreases as the rail fastening system fails,and correspondingly,the shape of contact patch between the rail pad and the sleeper becomes more irregular due to less constraints.…”
Get full text
Article -
14946
ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF
Published 2025-01-01“…Our results show that ESX’s rule-mining algorithm achieves over 99% accuracy in generating access control policies, using only 40% of the log entries for mining. …”
Get full text
Article -
14947
Recent Progress about Flight Delay under Complex Network
Published 2021-01-01“…This may be achieved by analyzing flight delay in frequency domain instead of time domain. (4) Summation of most critical nodes/edges may not be the most crucial group to network resilience or flight delay propagations. Effective algorithm for most influential sequence is to be developed.…”
Get full text
Article -
14948
Assessing Hydropower Potential in Nepal’s Sunkoshi River Basin: An Integrated GIS and SWAT Hydrological Modeling Approach
Published 2024-01-01“…The Sequential Uncertainty Fitting Version 2 (SUFI-2) algorithm, integrated within the SWAT Calibration and Uncertainty Program (SWAT-CUP), was employed to calibrate and validate the model. …”
Get full text
Article -
14949
Retinal Fundus Image Enhancement Using the Normalized Convolution and Noise Removing
Published 2016-01-01“…First, the original retinal fundus image was processed by the normalized convolution algorithm with a domain transform to obtain an image with the basic information of the background. …”
Get full text
Article -
14950
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01“…Due to thelack of strict access control, identity authentication and abnormal call detection, attackers may develop malicious applications easily and then it leads to theabuse of the northbound interface API (application programming interface) accordingly.There are mainly two patterns of DDoS (distributed denial-of-service) attacks against application layer.1) malicious App bypass the security review of the northbound interface and make a large number of calls to some API in a short time, thus causing the controller to crash and paralyzing the whole network; 2) attackers take a legitimate SDN (software defined network) application as the target and make a large number of short-time calls to the specific API needed by the application, which makes the legitimate App unable to call the API normally.Compared with the first pattern, the second one is more subtle.Therefore, it’s necessary to distinguish whether the App is malicious or not, effectively clean the App running on the attacked controller, and redistribute the controller to the legitimate App.Based on the in-depth analysis of the development trend of the current northbound interface, the possible DDoS attack patterns were simulated and practiced.Then a DDoS defense mechanism for SDN application layer was proposed.This mechanism added an App management layer between SDN application layer and control layer.Through reputation management, initial review, mapping allocation, anomaly detection and identification migration of the App, the malicious App attack on SDN can be predicted and resisted.The proposal focused on pre-examination of malicious App before attacks occur, so as to avoid attacks.If the attack has already happened, the operation of cleaning and separating the legitimate App from the malicious App is triggered.Theoretical and experimental results show that the proposed mechanism can effectively avoid DDoS attacks in SDN application layer, and the algorithm runs efficiently.…”
Get full text
Article -
14951
Optimal Bus-Bridging Service under a Metro Station Disruption
Published 2018-01-01“…Two main contributions are made: (1) a three-layer discrete choice behavior model is developed to analyze the dynamic passenger flow demand under station disruption; and (2) an integrated algorithm is designed to manage and control the station disruption crisis by providing additional bus-bridging services with the objective of minimizing the total travel time of affected passengers and the operating cost of bridging-buses. …”
Get full text
Article -
14952
Testing convolutional neural network based deep learning systems: a statistical metamorphic approach
Published 2025-01-01“…Furthermore, we also propose an MRs minimization algorithm for the CUT, thus saving computational costs and organizational testing resources.…”
Get full text
Article -
14953
Using the clustering method to find the final environmental parameters coefficients in road construction projects
Published 2025-02-01“…In the first phase, the Genetic Optimization Algorithm was implemented to determine convenient coefficients for the relevant parameters. …”
Get full text
Article -
14954
Effects of Regional Trade Agreement to Local and Global Trade Purity Relationships
Published 2020-01-01“…Here, we separate the influence of geographical distance, economic volume, and overall increase in transportation and labor costs and use the expectation maximization algorithm to optimize the parameters and quantify the trade purity indicator, which describes the true global trade environment and relationships among countries. …”
Get full text
Article -
14955
Deep learning models for detection of explosive ordnance using autonomous robotic systems: trade-off between accuracy and real-time processing speed
Published 2024-11-01“…The main contribution of this study is the results of a detailed evaluation of the YOLOv8 and RT-DETR models for real-time EO detection, helping to find trade-offs between the speed and accuracy of each model and emphasizing the need for special datasets and algorithm optimization to improve the reliability of EO detection in autonomous systems.…”
Get full text
Article -
14956
Extreme‐Event Magnetic Storm Probabilities Derived From Rank Statistics of Historical Dst Intensities for Solar Cycles 14–24
Published 2021-04-01“…Three different models are fitted to the cycle‐ranked −Dst1 and −Dst2 values using a maximum‐likelihood algorithm: A Gumbel model, an unconstrained Generalized‐Extreme‐Value model, and a Weibull model constrained to have a physically justified maximum storm intensity of −Dstm = 2500 nT. …”
Get full text
Article -
14957
Global foot-and-mouth disease risk assessment based on multiple spatial analysis and ecological niche model
Published 2025-12-01“…This study utilized multi-distance spatial cluster analysis, kernel density analysis, directional distribution analysis to investigate the spatial distribution patterns of historical FMD epidemics. A multi-algorithm ensemble model considering climatic, geographic, and social factors was developed to predict the suitability area for FMDV, and then risk maps of FMD for each species of livestock were generated in combination with the distribution of livestock. …”
Get full text
Article -
14958
Optimizing Solar Energy Harvesting: A K‐Means Clustering Approach for Enhanced Efficiency and Viability
Published 2025-01-01“…This research introduces an innovative synthesis method for a typical solar radiation year (TSRY) based on K‐means clustering to maximize energy harvest. The K‐means algorithm, a fundamental image processing technique, is utilized to classify images into distinct groups. …”
Get full text
Article -
14959
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01“…The security of the presumptive algorithm to be more efficient in front of the security challenges facing cloud computing. …”
Get full text
Article -
14960
Comparative Study of Statistical Features to Detect the Target Event During Disaster
Published 2020-06-01“…Therefore, SVM (linear kernel) with proposed features is applied for detecting the earthquake during disaster. The proposed algorithm is tested on Nepal earthquake and landslide datasets, 2015.…”
Get full text
Article