A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing
The quality of software test data is assessed through mutation testing. This technique involves introducing various modifications (mutants) to the original code of the program. The test data’s effectiveness, known as the test score, is quantified ...
A supervised active learning method for identifying critical nodes in IoT networks
The energy efficiency of wireless sensor networks (WSNs) as a key feature of the Internet of Things (IoT) and fifth-generation (5G) mobile networks is determined by several key characteristics, such as hop count, user’s location, allocated power, ...
The Egyptian national HPC grid (EN-HPCG): open-source Slurm implementation from cluster to grid approach
Recently, Egypt has recognized the pivotal role of High Performance Computing in advancing science and innovation. Additionally, Egypt realizes the importance of collaboration between different institutions and universities to consolidate their ...
A novel optimization method: wave search algorithm
This paper proposes a novel optimization method inspired by radar technology: wave search algorithm (WSA). The WSA algorithm not only draws on radar technology for its unique algorithmic design for the first time but also uses a new initialization ...
Simulating stellar merger using HPX/Kokkos on A64FX on Supercomputer Fugaku
The increasing availability of machines relying on non-GPU architectures, such as ARM A64FX in high-performance computing, provides a set of interesting challenges to application developers. In addition to requiring code portability across ...
A novel RPL defense mechanism based on trust and deep learning for internet of things
Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and related issues to privacy become considerable interest of researchers. On the other hand, the de ...
Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach
In this paper, we propose a novel protection scheme for N-qubit Greenberger–Horne–Zeilinger (GHZ) states against amplitude damping noise, using unilateral operations. The key innovation lies in the implementation of local operations on a single ...
SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene
Traditional camera sensors rely on human observation. However, in complex scenes, people often experience fatigue when observing objects of various sizes. Moreover, human cognitive abilities have inherent limitations, leading to potential judgment ...
FCNet: a deep neural network based on multi-channel feature cascading for image denoising
A lot of current work based on convolutional neural networks (CNNs) has fetched good visual results on AWGN (additive white Gaussian noise) removal. However, ordinary neural networks are unable to recover detailed information for complex tasks, ...
ACANet: attention-based context-aware network for infrared small target detection
Small infrared targets in complex backgrounds are easily obscured by a large amount of clutter, so highly discriminative features are needed to distinguish them from the cluttered background. Even if the expansion factor is increased, methods ...
Clustering-assisted gradient-based optimizer for scheduling parallel cloud workflows with budget constraints
Cloud computing has gradually become one of the most popular platforms for executing scientific applications due to its elastic and on-demand resource provisional capabilities. But, how to effectively schedule a set of parallel workflows to ...
Design of a multilayer reversible ALU in QCA technology
A promising alternative for the CMOS technology is the Quantum-dot Cellular Automata (QCA) technology. In this technology, the low-latency, ultra-dense, and low-power consumption digital circuits are designed. Until now, many digital circuits are ...
A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link
In contemporary times, the proliferation of phishing attacks presents a substantial and growing challenge to cybersecurity. This fraudulent tactic is designed to deceive unsuspecting individuals, enticing them to access malicious websites and ...
Performance evaluation of Word2vec accelerators exploiting spatial and temporal parallelism on DDR/HBM-based FPGAs
Word embedding is a technique for representing words as vectors in a way that captures their semantic and syntactic relationships. The processing time of one of the most popular word embedding technique Word2vec is very large due to the huge data ...
A deep learning-based approach for predicting in-flight estimated time of arrival
Predictability is key for efficient and safe air traffic management. In particular, accurately estimating time of arrival for current passenger flights may help terminal controllers to plan ahead and optimize airport operations in terms of safety ...
On the computation of the gradient in implicit neural networks
Implicit neural networks and the related deep equilibrium models are investigated. To train these networks, the gradient of the corresponding loss function should be computed. Bypassing the implicit function theorem, we develop an explicit ...
MS-HRNet: multi-scale high-resolution network for human pose estimation
Human pose estimation has important applications in medical diagnosis (such as early diagnosis of autism in children and assisting with the diagnosis of Parkinson’s disease), human-computer interaction, animation, and other fields. Currently, many ...
Post-quantum security design for hierarchical healthcare systems based on lattices
The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks, computers and software applications to enable medical tracking, mobility and emergency services ...
Order structure analysis of node importance based on the temporal inter-layer neighborhood homogeneity rate of the dynamic network
The analysis of node order structure in dynamic temporal networks is significant for network propagation control. To further accurately characterize the inter-layer coupling relationship of dynamic temporal networks, this paper firstly defines the ...
Cleaner fish optimization algorithm: a new bio-inspired meta-heuristic optimization algorithm
This paper proposes a new meta-heuristic optimization algorithm called Cleaner Fish Optimization algorithm (CFO) inspired by cleaner fish. The CFO simulates the movement behavior of cleaner fish when performing “cleaning services" and the behavior ...
An enhanced object detection network for ship target detection in SAR images
Deep learning techniques have made significant advancements in computer vision. The YOLO algorithm, a representative single-stage detection approach, has demonstrated remarkable results in detecting ship targets in SAR images. We introduce an ...
TS-Finder: privacy enhanced web crawler detection model using temporal–spatial access behaviors
Web crawler detection is critical for preventing unauthorized extraction of valuable information from websites. Current methods rely on heuristics, leading to time-consuming processes and inability to detect novel crawlers. Privacy protection and ...
FGCF: fault-aware green computing framework in software-defined social internet of vehicle
The social internet of vehicle (SIoV) is a specialized network combining intelligent sensing devices and vehicular communications to address traffic monitoring and resource management challenges in smart cities. Ensuring efficient and sustainable ...
HyperTuner: a cross-layer multi-objective hyperparameter auto-tuning framework for data analytic services
Hyperparameters optimization (HPO) is vital for machine learning models. Besides model accuracy, other tuning intentions such as model training time and energy consumption are also worthy of attention from data analytic service providers. ...
Enhancing learning environments with IoT: a novel decision-making approach using probabilistic linguistic T-spherical fuzzy set
The Internet of Things is a system of networked devices that can gather, process, and share data through the Internet. The Internet of Things has vast potential to spread widely across various aspects of our lives. The educational process model is ...