ترتیب بر اساس: جدیدترینپربازدیدترین
فیلترهای جستجو: فیلتری انتخاب نشده است.
نمایش ۲٬۹۰۱ تا ۲٬۹۱۰ مورد از کل ۲٬۹۱۰ مورد.
۲۹۰۱.

The Impact of Smartphone Users’ Digital Literacy on Information Security Protection Intentions(مقاله علمی وزارت علوم)

کلیدواژه‌ها: digital Literacy Information security protection Second-order factor model Smartphone

حوزه‌های تخصصی:
تعداد بازدید : ۲۲ تعداد دانلود : ۱۵
In the digital economy era, the widespread use of smartphones has brought about new information security threats, increasing the risk of data leakage from personal devices. Digital literacy, defined as the skills and knowledge needed to navigate digital life effectively, offers new perspectives and motivation for safeguarding personal information security. This study investigates the relationship between digital literacy and smartphone users’ intention to protect their information security. Drawing on Protection Motivation Theory (PMT) and Technology Threat Avoidance Theory (TTAT), a theoretical model was developed to examine both the direct and indirect effects of digital literacy on users’ information security protection intentions. Questionnaire data from 372 smartphone users in China were analyzed using Structural Equation Modeling (SEM). The results reveal that digital literacy has a significant positive impact on users’ response efficacy, self-efficacy, and their intention to protect information security. Moreover, digital literacy influences protection intention indirectly through self-efficacy and response efficacy. However, perceived threat, although positively influenced by digital literacy, does not have a significant effect on users’ protection intention. This study offers valuable insights for policymakers, educators, and businesses in promoting a secure mobile environment and provides practical recommendations for enhancing personal information security in the digital age.
۲۹۰۲.

A Robust Deep Learning Framework: Ensemble of YOLOv8 and EfficientNet(مقاله علمی وزارت علوم)

کلیدواژه‌ها: deep learning EfficientNet Yolov8 Image classification Object Detection Loss

حوزه‌های تخصصی:
تعداد بازدید : ۲۰ تعداد دانلود : ۱۵
This research work aims to present a robust deep learning framework by devising a deep learning-based ensemble method of YOLOv8 and EfficientNet. The suggested model is evaluated on the dataset collected from Kaggle, comprising 10,000 high-definition images of stems, leaves, and cut fruits of banana and papaya. These images are captured under different lighting conditions and thus expanded to 80,000 images. Authors have proposed an ensemble model comprising YoloV8 and EfficientNet as base deep learning models to enhance prediction and classification performance. Here, authors combine the merits of both models, i.e., speed of YoloV8 and the accuracy of EfficientNet, by putting a majority voting method in place. The final forecast is determined by majority voting, and EfficientNet is given higher significance in the situation of a tie owing to its enhanced accuracy. The proposed model presents a robust solution for agricultural disease management and demonstrates significant improvements in the detection of diseases in papaya and banana, opening avenues for its widespread employment in real life.
۲۹۰۳.

Incorporating Retroactive Operations in Large Temporal Databases Using Retroactive B-Tree(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Indexing Retroactive Query Answering Temporal Databases Retroactive B-Tree Persistent B-Tree Temporal Database Indexing Problem

حوزه‌های تخصصی:
تعداد بازدید : ۲۱ تعداد دانلود : ۱۴
Temporal databases, quickly rising in size, are distinguished by their capacity to maintain the older version of data objects against actions on them, allowing logical deletions. Queries for historical data are particularly costly due to the linear scanning of temporal versions. Temporal data structures like time-split B-Tree or multiversion B-Tree are working underlying the state-of-the-art temporal databases. So far, most efficient temporal data structures are partially persistent or fully persistent, but none of them support retroactive queries. On the other hand, efficient temporal indexing is required to address bulk loading in a real-life application. To the best of our knowledge, there is no efficient solution for bulk loading and updating retroactive index structures. This article seeks to offer a new data structure, the Retroactive B-Tree (RBT), to facilitate retroactive operations in temporal databases as well as bulk loading. It presents theoretical and empirical research and analysis of the suggested data structure and its relevant operations. The experiments were conducted to demonstrate the performance of the proposed retroactive B-Tree in terms of execution time, I/O complexity, space complexity, and bulk loading. The obtained results show that indexing with a buffer is the most powerful model for existing temporal databases for implementing a retroactive B-Tree. The tree of lists architecture is observed as an I/O efficient data structure for all variants of temporal indexing for large databases.
۲۹۰۴.

HybridTouch: A Robust Framework for Continuous User Authentication by GAN-Augmented Behavioral Biometrics on Mobile Devices(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Mobile Authentication Touch Dynamics deep learning Smartphone Sensors Convolutional neural networks

حوزه‌های تخصصی:
تعداد بازدید : ۱۹ تعداد دانلود : ۱۸
With an increasing reliance on mobile devices, continuous and assured user authentication is essential to protect sensitive personal data and digital interactions from unwanted access. Based on this background, this research proposed the development of the HybridTouch framework for smartphone-based continuous and passive user authentication. The proposed HybridTouch combines Convolutional Neural Networks for spatial feature extraction and Gated Recurrent Units for temporal sequence analysis. It uses accelerometer, gyroscope, and touch data to take advantage of the unique behavioral patterns captured by it. Innovative preprocessing techniques have been incorporated into the proposed approach: Discrete Wavelet Transform is used for signal denoising, and Variable-Length Adaptive Temporal windowing is used for segmentation based on signal entropy to enhance feature representation. To eliminate the data scarcity limitation, Generative Adversarial Networks were used to synthesize realistic behavioral data that considerably augmented the dataset and enhanced model generalization capability. Extensive experiments conducted on the Hand Movement, Orientation, and Grasp (HMOG) dataset showed that the proposed HybridTouch achieved excellent results with authentication accuracy up to 98.8% with real data, growing up to 99% with GAN-augmented data. The hybrid model further has an equal error rate of 1.4% on real data and 1.25% on synthetic data, which is better than any other models currently present (Sağbas et al., 2024; Siddiqui et al., 2022; Abuhamad et al., 2020) and all implementations of standalone convolutional neural networks and gated recurrent units.
۲۹۰۵.

Evolution of Digital Transformation in Construction Research: Topic Modelling Analysis(مقاله علمی وزارت علوم)

کلیدواژه‌ها: topic modeling Digital Transformation Industry 4.0 Construction Industry Building Disruptive Technology

حوزه‌های تخصصی:
تعداد بازدید : ۱۸ تعداد دانلود : ۸
This article examines digital transformation in the construction industry, which begins with adopting digital technologies and culminates in comprehensive organizational change. The diverse and often conflicting conceptualizations in this field have created ambiguity in the theoretical framework of digi-tal transformation in construction. Using topic modeling and pattern analysis, this study identifies key themes and trends in the domain. The article analyzes 1,308 articles published between 1990 and 2023 to review research areas related to digital transformation in the construction industry. It identifies six main topics: Security & Safety, Organization & Project Management, Digital Simulation & Interaction, Sustainability, Innovative Building Materials, and Dynamic Monitoring Methods. The analysis reveals that Organization & Project Management is the most researched topic, while Sustainability receives the least attention. The article offers recommendations for advancing research in this field and serves as a valuable reference for researchers and practitioners interested in digital transformation in construction. By addressing existing criticisms, it provides a clear map of the field’s structure and trends, comple-menting previous qualitative studies with a broader, more structured, and objective analysis.
۲۹۰۶.

Enhancing Fake News Detection by Attention-Based BiLSTM and Hybrid Whale-Multi-Verse Optimization(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Bidirectional LSTM deep learning Fake news detection Hierarchical Hybrid Op-timization Information Extraction

حوزه‌های تخصصی:
تعداد بازدید : ۱۸ تعداد دانلود : ۱۴
The proliferation of fake news, characterized by the dissemination of inaccurate information to deceive audiences, has become a pressing concern in recent times. Traditional approaches to phony news detection, often focused on analyzing Twitter content, are susceptible to noise and variations in input sequences, leading to suboptimal performance. To address these challenges, this study proposes a novel method called Multi-Head Attention-Hierarchical Bidirectional Long Short-Term Memory (MHA-HBiLSTM) Networks. Our approach involves two phases: training and testing, wherein we employ tweet pre-processing techniques such as stemming, punctuation removal, stop-word elimination, URL handling, and Twitter control removal. Features are represented using the Glove word embedding technique for experimental evaluation and comparison. The MHA-HBiLSTM model integrates multi-head attention and hierarchical concepts, allowing meaningful information extraction from Twitter data. Notably, our model utilizes dual-level attention mechanisms and a hierarchical structure, reflecting the inherent hierarchy in documents and prioritizing key material during document representation. The effectiveness of the proposed MHA-HBiLSTM algorithm is evaluated using the Whale & Multi-Verse (W-MVO) Optimizer approach, with tests conducted on Kaggle and FakeNewsNet datasets. Comparative analysis with traditional machine learning approaches and deep learning models demonstrates the superior performance of the MHA-HBiLSTM approach in fake news detection.
۲۹۰۷.

Optimizing Vertical Handover Using Multi-Criteria Decision Making in Heterogeneous Networks(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Vertical handover quality of service wireless communications Technology Internet Protocols standard

حوزه‌های تخصصی:
تعداد بازدید : ۱۸ تعداد دانلود : ۱۲
Vertical handover (VHO) in heterogeneous wireless networks is essential to keep users continuously connected and also to guarantee that the Quality of Service (QoS) of mobile communications is adequate. The focus of this paper is to apply various Multi-Criteria Decision Making (MCDM) tools to model a comprehensive VHO decision-making framework. This proposed methodology brings together more than one parameter of a given networking environment, such as signal intensity, QoS, and energy requirements, into one or more decision models. Using analytical methods such as the Analytical Hierarchy Process (AHP) for criteria weighting, we continuously optimize network conditions, thereby enhancing the efficiency and reliability of Vertical Handover (VHO). Several experiments were made to test the efficiency of the given MCDM-based VHO algorithm. The performance evaluation of the proposed method reveals superior handover performances in terms of success rates, less latency, and better QoS as compared to other VHO techniques. In addition, our research conclusion implies that integrating MCDM into the VHO decision-making will not only facilitate the network resource optimization but also improve the user satisfaction in the heterogeneous networking domain. This paper, in the wireless communications area, makes a significant contribution by presenting a powerful framework for DNS and VHO. The subsequent studies will be directed towards improving this algorithm for real-time applications and experimentation in the new generation networks, such as 5G Networks.
۲۹۰۸.

A Hybrid Approach to Feature Extraction and Information Gain-Based Reduction for Image Classification(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Image classification Feature extraction feature reduction information gain UCI ge-netic algorithm

حوزه‌های تخصصی:
تعداد بازدید : ۱۸ تعداد دانلود : ۱۹
Image classification is a significant process in the field of computer science. It has applications in every field, such as spam detection in emails, medical diagnosis, image recognition, sentiment analysis, object detection, weather forecasting, pattern recognition, and security. Image classification deals with the grouping of images based on labels or characteristics. Feature extraction, feature selection, feature reduction, and classification are the main steps used to classify images. A medicinal and non-medicinal flowers data set is prepared by clicking images for the study. Methodology is used to achieve satisfactory classification results on the seeds, Wisconsin Diagnostic Breast Cancer, Heart Failure Clinical Records, and Wisconsin Prognostic Breast Cancer data sets, which are taken from the University of California, Irvine (UCI) repository. The proposed methodology suggests an efficient feature extraction and selection approach for data sets under consideration. An information gain-based genetic algorithm is used for feature reduction. It is performed on the extracted features to retrieve an optimized feature set. Fitness of the features is evaluated to choose the most relevant features. A neural network is used to classify the obtained feature subset. Better classification results are attained with the help of feature extraction and feature reduction.
۲۹۰۹.

Adaptive Differential Privacy for Protecting User Confidential Information on Android Devices(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Android Security Data protection Confidential Information Data Leakage App Vul-nerabilities

حوزه‌های تخصصی:
تعداد بازدید : ۱۶ تعداد دانلود : ۱۴
The widespread adoption of Android phones has heightened concerns about user privacy. This research presents an Adaptive Privacy Management System (APMS) that integrates Machine Learning (ML) models with Differential Privacy techniques to enhance privacy protection. The APMS monitors application behavior and employs ML algorithms to detect anomalies and enable context-aware privacy enforcement. Differential Privacy ensures that sensitive data remains protected through the addition of noise and privacy-preserving computations. Experimental results demonstrate that the APMS achieves a 92.5% accuracy rate in detecting the privacy leakage. The anomaly detection model, using Random Forest, shows high accuracy (92.5%), recall (89.5%), and precision (73.9%), effectively identifying both normal and anomalous behaviors. Additionally, the impact of noise on data utility, controlled by the privacy budget (ε), is manageable. The results show that APMS is a robust system for safeguarding user confidential information, contributing to a more secure and privacy-centric Android ecosystem.
۲۹۱۰.

Enhancing Privacy and Efficiency Techniques in Federated Learning Systems: Applications in Healthcare, Finance, and Smart Devices(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Federated Learning (FL) Privacy Enhancement Adaptive Federated Optimization Heterogeneity Scalability Federated Averaging

حوزه‌های تخصصی:
تعداد بازدید : ۱۴ تعداد دانلود : ۱۳
Federated Learning (FL) has emerged as a revolutionary technique for distributed machine learning for training a model on shared data without sharing the data itself. Nevertheless, privacy-related concerns and scalability difficulties remain a problem. This paper discusses the state-of-the-art works to improve the privacy and convergence at FL frameworks for targeted healthcare and financial applications, as well as smart devices. It focuses on methodologies that preserve user privacy, such as differential privacy, homomorphic encryption, secure multi-party computation, and methods that enhance the model’s efficiency, including model compression, communication optimization, and adaptive optimization algorithms. To overcome these challenges, this study helps in the future design of FL systems for vital domains with high scalability.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

زبان