This research aims to address the significant threat produced by Distributed Denial of Service (DDoS) attacks in cybersecurity and proposes a framework PCA-Based EDAD for detecting these attacks. In the proposed framework, various supervised…
Category: 7. Maths
-

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models
Overall architecture
Figure 1 provides an overview of the architecture of Xray-YOLO-Mamba. The proposed detection model integrates Mamba with the YOLOv11-n framework, redesigning the backbone network by incorporating the Visual State Space (VSS)24…
Continue Reading
-

Availability and uncertainty-aware optimal placement of capacitors and DSTATCOM in distribution network using improved exponential distribution optimizer
In this study, the simultaneous optimization of the capacitor and DSTATCOM in the 33-bus distribution network has been implemented to minimize the cost of power losses, installation costs, and the initial investment in reactive power, taking into…
Continue Reading
-

Granular soil particle breakage prediction model based on population evolution theory
In nature, a multi-particle group consists of multiple single-particle groups, where particles of different sizes experience varying contact stresses due to differences in their contact areas. Although the fragmentation of both single-particle…
Continue Reading
-

Deep learning-based multi-criteria recommender system for technology-enhanced learning
This section presents a conceptual summary of the proposed approach. It discusses the dataset used, the experimental framework of the approach, and how our system was modeled.
Datasets
To evaluate the performance and how well the proposed…
Continue Reading
-

Increasing probability of extreme rainfall preconditioned by humid heatwaves in global coastal megacities
Duedall, I. W. & Maul, G. A. Demography of coastal populations. Encycl. Coast. Sci. Encycl. Earth Sci. Ser. 368, 374 (2005).
Feng, K., Ouyang, M. & Lin, N. Tropical cyclone-blackout-heatwave…
Continue Reading
-

An automated framework for assessing how well LLMs cite relevant medical references
This study was conducted in strict accordance with all applicable ethical standards, guidelines, and regulations governing research practices.
LLM evaluations
Our analysis focuses on evaluating the following top-performing LLMs: GPT-4o (RAG),…
Continue Reading
-

Tuberculosis detection using few shot learning
Datasets
Datasets utilized for this study, including two publicly available datasets maintained by the National Institutes of Health, which are from Montgomery County, Maryland, and Shenzhen, China12. Table 1 shows the summary of TB CXR image…
Continue Reading
-

A fine-grained course session recommendation method based on knowledge point pruning
Problem definition
The course recommendation adopts the Multi round Conversational Recommendation (MCR)26 method. This method asks learners about their preferences for a certain knowledge point and recommends it multiple times during the…
Continue Reading
-

Artificial intelligence-driven cybersecurity system for internet of things using self-attention deep learning and metaheuristic algorithms
This paper presents a novel ICSSADL-MHOA technique. The proposed ICSSADL-MHOA model aims to enhance a robust cybersecurity system in IoT networks. It involves various processes, such as data normalization, DR, classification, and parameter…
Continue Reading
