Distributed denial-of-service (DDoS) attacks are serious threats to the availability of a smart grid infrastructure services because they can cause massive blackouts. This study describes an anomaly detection method for...
The problem addressed is to develop a model that can reliably identify whether a previously unseen document pair is paraphrased or not. Its detection in Arabic documents is a challenge because of its variability in features and...
As the data on the online social networks is getting larger, it is important to build personalized recommendation systems that recommend suitable content to users, there has been much research in this field that uses conceptual...
Deep learning methods are characterized by their capacity to learn data representation compared to the traditional machine learning algorithms. However, these methods are prone to overfitting on small volumes of data. The...
The systems of eye classification in an image are indispensable in several domains. To better find the class of membership of the eye in a minimal time, the classic methods of detection are inadequate. Fuzzy logic is considered...
This paper introduces an evolutionary approach for training the adaptive network-based fuzzy inference system (ANFIS). The previous works are based on gradient descendent (GD); this algorithm converges very slowly and gets stuck...
The study's objective is to identify the non-linear relationship of differentially expressed genes that vary in terms of the tumour and normal tissue and correct for any variations among the RNA-Seq experiment focused on Oral...
The research deals with the original algorithms of the linguistic processor integration for solving planimetric problems. The linguistic processor translates the natural language description of the problem into a semantic...
Due to the highly variant face geometry and appearances, Facial Expression Recognition (FER) is still a challenging problem. CNN can characterize 2-D signals. Therefore, for emotion recognition in a video, the authors propose a...
Many-objective optimization problems (MaOPs) refer to those multi-objective problems (MOPs) withmore than three objectives. In order to solve MaOPs, a multi-objective particle swarm optimization algorithm based on new fitness...
Multilevel thresholding image segmentation has always been a hot issue of research in last several years since it has a plenty of applications. Traditional exhaustive search method consumes a lot of time for searching the...
The day-to-day lives of humans are changing remarkably due to the evolution in tools, techniques and technology across the planet. This evolution is not only impacting the growth of humans but also contributing to the growth and...
During the past two decades an enormous amount of visual information has been generated; as a result, content-based image retrieval (CBIR) has received considerable attention. In CBIR the image is used as a query to find the...
With the upsurge in restructuring of the power markets, wind power has become one of the key factors in power generation in the smart grids and gained momentum in the recent years. The accurate wind power forecasting is highly...
Nowadays, the IoT technology is developing rapidly. In order to protect the information security of the IoT, this paper applies the characteristics of quantum circuit, such as high complexity and no feedback, into the field of...
This article introduces the design of split range control and fuzzy logic control for temperature control of the MISO (multiple input single output) water tank scheme. A multiple input single output (MISO) system is considered...
Using satellite imagery and remote sensing data for supervised and self-supervised learning problems can be quite challenging when parts of the underlying datasets are missing due to natural phenomena (clouds, fog, haze, mist...
Improving software development efficiency based on existing APIs is one of the hot researches in software engineering. Understanding and learning so many APIs in large software libraries is not easy and software developers...
The paper proposes a generalized ordered weighted simplified neutrosophic cosine similarity (GOWSNCS) measure by combining the cosine similarity measure of simplified neutrosophic sets (SNSs) with the generalized ordered...
Assistance with the use of technical devices is required as soon as the tasks to be performed become complex. This assistance is also needed as soon as the authors provide assistance to users to find solutions to incidents that...
In order to solve some complex optimization problems, the SIR-DNA algorithm was constructed based on the DNA-based SIR (susceptible-infectious-recovered) infectious disease model. Since infectious diseases attack a very small...
Information retrieval refers to a noteworthy system of identifying relevant information and recovering it through specific procedures from stored system. These technique is used in many differentiated applications that deal with...
This paper presents a segmentation method to detect multiple sclerosis (MS) lesions in brain MRI based on the artificial immune systems (AIS) and a support vector machines (SVM). In the first step, AIS is used to segment the...
Popular real-world events often create huge traffic on Twitter including real-time updates of important moments, personal comments, and so on while the event is happening. Most of the users are interested to read the important...
The travelling salesman problem (TSP) is an NP-hard problem in combinatorial optimization. It has assumed significance in operations research and theoretical computer science. The problem was first formulated in 1930 and since...