Automatic data featurization for enhanced proactive service auto-scaling: Boosting forecasting accuracy and mitigating oscillation
Edge computing has gained widespread adoption for time-sensitive applications by offloading a portion of IoT system workloads from the cloud to edge nodes. However, the limited resources of IoT edge devices hinder service deployment, making auto-...
Link prediction using extended neighborhood based local random walk in multilayer social networks
One of these challenges in the analysis of social networks is the problem of link prediction. The purpose of this problem is to find links that have not yet been observed, but may exist in the future. There are many solutions for link prediction ...
Multiscale cascaded domain-based approach for Arabic fake reviews detection in e-commerce platforms
Fake reviews in e-commerce can lead to customer deception and financial losses. Despite the importance of fake reviews detection, studies for Arabic language are scarce due to the lack of comprehensive datasets. This study addresses this gap by ...
Highlights
- Constructing the first Arabic dataset for fake reviews detection based on gold-standard.
- Conducting single-domain, multi-domain, and cross-domain experiments.
- Introducing a cascading approach for results optimization.
Electrolytic capacitor surface defect detection based on deep convolution neural network
The existing methods for detecting surface defects in electrolytic capacitors are typically based on conventional machine vision, with limited feature extraction capabilities, poor versatility, slow detection speed, and the inability to achieve ...
Advancing speed limit detection in ADAS: A novel data-driven approach using Pareto-GBDTMO
Recognizing speed limit information is crucial for advanced driver assistance systems (ADAS) as it directly affects the safety planning and decision-making process of intelligent driving systems. However, traditional image recognition-based ...
MED-Prompt: A novel prompt engineering framework for medicine prediction on free-text clinical notes
Existing AI-based medicine prediction systems require substantial training time, computing resources, and extensive labeled data, yet they often lack scalability. To bridge these gaps, this study introduces a novel MED-Prompt framework that ...
Privacy-preserving recommendation system based on social relationships
In the era of internet-based data, recommendation systems are crucial for helping users access personalized content and facilitating business promotion and sales. Recommendation systems based on social relationships have gained popularity due to ...
EMB-YOLO: Dataset, method and benchmark for electric meter box defect detection
The electric meter box is a terminal device with a large number in the power grid. It may cause electrical hazards and property loss if damaged. Inspection of electricity meter boxes still relies on manual inspection with low efficiency and low ...
Optimized task offloading strategy in IoT edge computing network
As the IoT devices are highly ubiquitous and connected, their computational tasks can be processed on the Multi-access edge computing (MEC) servers because of the IoT devices’ limited battery, computing power and storage capacities. Due to the ...
Enhancing sign language recognition using CNN and SIFT: A case study on Pakistan sign language
Millions of people who have trouble hearing rely heavily on sign language as their primary means of communication. As a form of visual language, sign language is primarily used as features by the deaf and hard of hearing to communicate with one ...
Multimodal consistency-specificity fusion based on information bottleneck for sentiment analysis
Sentiment analysis, a subtask of affective computing, endows machines with the ability to sense and comprehend emotions. Recently, research attention has shifted from traditional isolated modality to ubiquitous multi-modalities, requiring to ...
Overlap-Aware Hierarchical Decoder for point cloud registration
Extracting high-quality correspondences is a critical challenge in current feature-learning based point cloud registration methods. Recently, coarse-to-fine network structures have shown great potential in addressing this challenge. Inspired by ...
Classification of Alzheimer’s disease using MRI data based on Deep Learning Techniques
- Shaymaa E. Sorour,
- Amr A. Abd El-Mageed,
- Khalied M. Albarrak,
- Abdulrahman K. Alnaim,
- Abeer A. Wafa,
- Engy El-Shafeiy
Alzheimer’s Disease (AD) is a worldwide concern impacting millions of people, with no effective treatment known to date. Unlike cancer, which has seen improvement in preventing its progression, early detection remains critical in managing the ...
Object segmentation for image indexing in large database
It is a challenging task to devise an effective model for object segmentation considering numerous classes because different classes might have different features and different backgrounds. We propose a unique segmentation and classification ...
Speech corpus for Medina dialect
Automatic Speech Recognition (ASR) has standard rules which must be followed and considered carefully. Some difficulties that lead to less ASR performance is variations in pronunciation and small words misrecognition. Arabic ASR faces some ...
Parallel private information retrieval protocol with index anonymity for untrusted databases
Private information retrieval (PIR) enables a client to search data from a single (or multiple) untrusted server, without revealing which entry was queried. PIR can be divided into two categories: information-theoretic PIR (IT-PIR) and ...
Graphical abstractDisplay Omitted
MTLink: Adaptive multi-task learning based pre-trained language model for traceability link recovery between issues and commits
Traceability links between issues and commits (issue-commit links recovery (ILR)) play a significant role in software maintenance tasks by enhancing developers’ observability in practice. Recent advancements in large language models, particularly ...
A process-aware framework to support Process Mining from blockchain applications
Several studies were conducted to demonstrate the application of Process Mining (PM) techniques to Ethereum-compatible application event data. However, the availability of event data is constrained by the application’s process awareness, which is ...
Graphical abstractDisplay Omitted
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration
- Ahsan Nazir,
- Jingsha He,
- Nafei Zhu,
- Ahsan Wajahat,
- Faheem Ullah,
- Sirajuddin Qureshi,
- Xiangjun Ma,
- Muhammad Salman Pathan
Ensuring robust security in the Internet of Things (IoT) landscape is of paramount importance. This research article presents a novel approach to enhance IoT security by leveraging collaborative threat intelligence and integrating blockchain ...
Automatic melanoma detection using discrete cosine transform features and metadata on dermoscopic images
Machine learning contributes in improving the accuracy of melanoma detection. There are extensive studies in classic and deep learning-based approaches for melanoma detection in the literature. Still, they are not accurate or require high ...
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing
DeepDefend is an advanced framework for real-time detection and prevention of DDoS attacks in cloud environments. It employs deep learning techniques, notably CNN-LSTM-Transformer networks, to predict network traffic entropy and detect potential ...
Hybrid blockchain-based many-to-many cross-domain authentication scheme for smart agriculture IoT networks
With the development of smart agricultural Internet of Things (IoT) projects, the need for extensive collaboration among agricultural devices from different domains has surged, necessitating the authentication of device identities for secure ...
Enhancing source code retrieval with joint Bi-LSTM-GNN architecture: A comparative study with ChatGPT-LLM
Retrieving relevant source code from large repositories is a significant and ongoing challenge in the field of software engineering, primarily due to the vast and ever-expanding amount of available code. Existing deep learning methods, although ...
Design of a dynamic and robust recommender system based on item context, trust, rating matrix and rating time using social networks analysis
Collaborative filtering recommender systems type have been increasingly used in e-commerce sites both to facilitate users' decision-making and increase sales. On the one hand, the open and interactive nature of recommender systems makes them ...
1D-CapsNet-LSTM: A deep learning-based model for multi-step stock index forecasting
Multi-step stock index forecasting is vital in finance for informed decision-making. Current forecasting methods for this task frequently produce unsatisfactory results due to the inherent randomness and instability of the data, thereby ...
Cross-scale Vision Transformer for crowd localization
Crowd localization can provide the positions of individuals and the total number of people, which has great application value for security monitoring and public management, meanwhile it meets the challenges of lighting, occlusion and perspective ...
Self-attention and long-range relationship capture network for underwater object detection
Underwater object detection has been shown to exhibit significant potential for exploring underwater environments. However, underwater datasets often suffer from degeneration due to uneven underwater light distribution, complex underwater ...
A hybrid combination of CNN Attention with optimized random forest with grey wolf optimizer to discriminate between Arabic hateful, abusive tweets
Arabic hateful speech recognition has long been a major area of focus in Natural Language Processing (NLP) research. In light of recent advancements in transformer models and deep learning, researchers are now turning to transfer learning ...
Amyotrophic lateral sclerosis prediction framework using a multi-level encoders-decoders-based ensemble architecture technology
Amyotrophic Lateral Sclerosis (ALS) is a rare disease and also known as Lou Gehrig’s disease. In addition, this disease is characterized by a progression in the nerve cells of the brain and spinal cord. These neuron cells control most of the ...
A framework for efficient cross-chain token transfers in blockchain networks
The proliferation of blockchain technology has resulted in diverse token standards, posing challenges for compatibility, security, and performance in existing cross-chain bridges. This paper introduces a novel framework capable of concurrently ...