Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice
Hiding high utility and frequent itemset is the method used to preserve sensitive knowledge from being revealed by pattern mining process. Its goal is to remove sensitive high utility and frequent itemsets from a database before sharing it for ...
Deterministic Centroid Localization for Improving Energy Efficiency in Wireless Sensor Networks
Wireless sensor networks are an enthralling field of study with numerous applications. A Wireless Sensor Network (WSN) is used to monitor real-time scenarios such as weather, temperature, humidity, and military surveillance. A WSN is composed of ...
A Proposal for Honeyword Generation via Meerkat Clan Algorithm
An effective password cracking detection system is the honeyword system. The Honeyword method attempts to increase the security of hashed passwords by making password cracking easier to detect. Each user in the system has many honeywords in the ...
Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis
Public health responses to the COVID-19 pandemic since March 2020 have led to lockdowns and social distancing in most countries around the world, with a shift from the traditional work environment to virtual one. Employees have been encouraged to ...
Data Fusion and the Impact of Group Mobility on Load Distribution on MRHOF and OF0
Many routing algorithms proposed for IoT are based on modifications on RPL objective functions and trickle algorithms. However, there is a lack of an in-depth study to examine the impact of mobility on routing protocols based on MRHOF and OF0 ...
Citation and Similarity in Academic Texts: Colombian Engineering Case
This article provides the results of a citation determinants model for a set of academic engineering texts from Colombia. The model establishes the determinants of the probability that a text receives at least one citation through the relationship ...
Combination of Resnet and Spatial Pyramid Pooling for Musical Instrument Identification
Identifying similar objects is one of the most challenging tasks in computer vision image recognition. The following musical instruments will be recognized in this study: French horn, harp, recorder, bassoon, cello, clarinet, erhu, guitar ...
Early Student-at-Risk Detection by Current Learning Performance and Learning Behavior Indicators
The article is focused on the problem of early prediction of students’ learning failures with the purpose of their possible prevention by timely introducing supportive measures. We propose an approach to designing a predictive model for an ...
Hy-MOM: Hybrid Recommender System Framework Using Memory-Based and Model-Based Collaborative Filtering Framework
Lack of personalization, rating sparsity, and cold start are commonly seen in e-Learning based recommender systems. The proposed work here suggests a personalized fused recommendation framework for e-Learning. The framework consists of a two-fold ...
Blockchain-Enabled Supply-Chain in Crop Production Framework
The purpose of this paper is to propose an approach to blockchain-enabled supply-chain model for a smart crop production framework. The defined tasks are: (1) analysis of blockchain ecosystem as a network of stakeholders and as an infrastructure ...
Long Short Term Memory Neural Network-Based Model Construction and Fne-Tuning for Air Quality Parameters Prediction
Air pollution has increased worries regarding health and ecosystems. Precise prediction of air quality parameters can assist in the effective action of air pollution control and prevention. In this work, a deep learning framework is proposed to ...
ESAR, An Expert Shoplifting Activity Recognition System
Shoplifting is a troubling and pervasive aspect of consumers, causing great losses to retailers. It is the theft of goods from the stores/shops, usually by hiding the store item either in the pocket or in carrier bag and leaving without any ...