-
17981
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security
Published 2025-01-01“…This collection of attributes is employed to generate a feature vector that serves as the input for the Naive Bayes classification algorithms. The classifier is trained using a labeled dataset and then learns to distinguish between benign and malicious requests by assessing their computed probabilities. …”
Get full text
Article -
17982
Ensemble-Based Alzheimer's Disease Classification Using Features Extracted from Hog Descriptor and Pre-trained Models
Published 2024-12-01“…The features derived from the inception module, residual modules, and histogram of oriented gradients descriptor are subjected to classification through bagging and boosting algorithms. The proposed model has surpassed many state-of-the-art studies by achieving a high success rate of 99.60% in detecting Alzheimer's disease in its early stages.…”
Get full text
Article -
17983
Orthogonal Latin square theory based group and batch verification for digital signatures
Published 2022-02-01“…In order to solve the problem of fast security verification of massive and time-intensive messages on a central node in situational awareness networks, orthogonal Latin square theory based scheme was considered.Considering efficiency promotion of security verification of messages, group design of digital signatures based on orthogonal Latin square theory was formulated, batch verification of digital signatures was processed by aggregate signature, then an efficient, parallel and non-adaptive batch verification scheme of digital signatures was proposed in according with multiple processors.Theoretical analysis and simulation results demonstrate that it will be able to identify n digital signatures by approximately <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msqrt> <mi>n</mi> </msqrt> </math></inline-formula> times given the upper bound d (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi>d</mi><mo>≪</mo><mi>n</mi></math></inline-formula>) of invalid digital signatures, together with higher time-efficiency and stronger error-tolerance by comparing with individual testing and binary splitting algorithms especially when multiple processors are available.…”
Get full text
Article -
17984
Assessment of food toxicology
Published 2016-09-01“…These systems utilize a combination of complex in vitro cell-based models with computer-based algorithms. A decrease of rodent animal testing with its limitations of high costs, low throughput readouts, inconsistent responses, ethical issues and concerns of extrapolability to humans have led to an increased use of these but also alternative lower hierarchy surrogate animal models (e.g. …”
Get full text
Article -
17985
Separation of the Structure Signal by the Maximal Overlap Discrete Wavelet Transform and Fast Fourier Transform
Published 2021-01-01“…With the combination of these two algorithms, MODWT and FFT, the signals of the synthesized vibration have been separated into component signals with different frequency ranges. …”
Get full text
Article -
17986
A Comprehensive Review of the Diagnostics for Pediatric Tuberculosis Based on Assay Time, Ease of Operation, and Performance
Published 2025-01-01“…Gaps in the existing diagnostic methods, algorithms, and operational costs were also reviewed. …”
Get full text
Article -
17987
Classification Based on Pruning and Double Covered Rule Sets for the Internet of Things Applications
Published 2014-01-01“…However, many traditional rule-based classifiers cannot guarantee that all instances can be covered by at least two classification rules. Thus, these algorithms cannot achieve high accuracy in some datasets. …”
Get full text
Article -
17988
Understanding HLA-DQ in renal transplantation: a mini-review
Published 2025-02-01“…Emerging molecular mismatch algorithms refine immunogenicity assessments by analyzing amino acid differences and structural interactions. …”
Get full text
Article -
17989
Emotional intelligence in management activities аnd artificial intelligence technologies
Published 2025-01-01“…The article examines the role of emotional intelligence (emotional quotient) in the process of management activities and the competing position of artificial intelligence (hereinafter referred to as AI), which is trying to master it through learning algorithms and implementation in management practice. …”
Get full text
Article -
17990
Utilizing Structural Network Positions to Diversify People Recommendations on Twitter
Published 2022-01-01“…Social recommender systems, such as “Who to follow” on Twitter, utilize approaches that recommend friends of a friend or interest-wise similar people. Such algorithmic approaches have been criticized for resulting in filter bubbles and echo chambers, calling for diversity-enhancing recommendation strategies. …”
Get full text
Article -
17991
A New Lifetime Distribution and Its Power Transformation
Published 2014-01-01“…Maximum likelihood estimation for the two-parameter model using complete samples is investigated. Different algorithms for generating random samples from the two new models are given. …”
Get full text
Article -
17992
Retinal revelations: Seeing beyond the eye with artificial intelligence
Published 2024-12-01“…This field, known as oculomics, leverages AI and deep learning algorithms to process vast amounts of data from imaging techniques such as fundus photography, optical coherence tomography (OCT), OCT angiography, infrared iris imaging, slit-lamp photography, and external eye photography. …”
Get full text
Article -
17993
APPLICATION OF TRADITIONALTHEORIES IN THE AGE OF CYBER COMMUNICATION
Published 2024-06-01“…It argues for the need to adapt and modify these theories to account for the unique characteristics of cyber communication, including networked connectivity, user-generated content, and algorithmic influence. A nuanced understanding of the socio-cultural, technological, and contextual factors shaping digital communication practices is emphasized. …”
Get full text
Article -
17994
Radar system for unmanned aerial vehicles
Published 2024-12-01“…Application of digital signal processing methods for formation of radio holograms and extraction of information about objects. Use of algorithms for automatic processing and analysis of the obtained data in real time. …”
Get full text
Article -
17995
Minimum Risk Facility Location-Allocation Problem with Type-2 Fuzzy Variables
Published 2014-01-01“…On the basis of formula obtained, we can convert original fuzzy FLA model into its equivalent parametric mixed integer programming form, which can be solved by conventional numerical algorithms or general-purpose software. Taking use of structural characteristics of the equivalent optimization, we design a parameter decomposition method. …”
Get full text
Article -
17996
Integrated Experimental and Numerical Comparison of Different Approaches for Planar Biaxial Testing of a Hyperelastic Material
Published 2016-01-01“…Then, material parameters for a suitable hyperelastic law were determined for each configuration examined, employing an inverse method which combines numerical simulations with the finite element method (FEM) and optimization algorithms. Finally, efficiency of examined biaxial configurations was assessed comparing stress reductions factor, degree and uniformity of biaxial deformation, and operative strain ranges.…”
Get full text
Article -
17997
Authorship identification methods in student plagiarism detection
Published 2023-11-01“…Both classical methods, which include text comparison and similarity search, and modern methods based on machine learning algorithms, as well as their combination and potential modifications, are considered. …”
Get full text
Article -
17998
CoAt-Set: Transformed coordinated attack dataset for collaborative intrusion detection simulationMendeley Data
Published 2025-04-01“…It is suitable for various applications, including collective threat intelligence research, analyzing distributed threat patterns, developing machine learning algorithms for distributed systems, and training simulations designed for heterogeneous network environments.…”
Get full text
Article -
17999
SuroTex: Surrounding texture datasetMendeley Data
Published 2025-04-01“…However, the existing texture datasets such as KTH-TIPS, KTH-TIPS2, USPTex, DTD, and ALOT still have limitations which causes the resulting analysis on different texture classification algorithms to be somewhat unreliable. The two main reasons behind this problem are the limited number of texture classes and the non-uniformity of the image sizes. …”
Get full text
Article -
18000