期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Machine Learning for Identifying Harmful Online Behavior: A Cyberbullying Overview
1
作者 Rikin Shrestha Rushit Dave 《Journal of Computer and Communications》 2025年第1期26-40,共15页
In this modern era, platforms for digital/social media and video games are growing daily. People are becoming dependent on them from all ages and with many positive aspects, but there are drawbacks as well, one of whi... In this modern era, platforms for digital/social media and video games are growing daily. People are becoming dependent on them from all ages and with many positive aspects, but there are drawbacks as well, one of which is cyberbullying. Cyberbullying is a form of bullying that uses technological platforms to bully others. It has effects on victims mentally, emotionally, and physically, which include low self-esteem, acting violently, despair, increased stress/anxiety, depression, self-harming/suicide, etc. Findings from this research study justify that it affects young people more, impacting their emotional development and overall safety. Real-time cyberbullying detection identifies and protects the target from further abuse and its effects. This study aids in determining the seriousness of the issue and the vulnerabilities that individuals can take advantage of to bully others. Additionally, it will help to understand how various features of cyberbullying detection function assist in developing a strong and trustworthy system and making a healthy online community. Natural Language Processing (NLP) models assess the textual content and analyze hashtags and comments. Similarly, image context is analyzed using Optical Character Recognition (OCR), which converts images into a machine-readable format for further examination. There are also Deep Neural Network models, such as Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), and Bidirectional LSTM (BLSTM). CNN is utilized for text/picture classification, LSTM is used for long-term dependency learning, and BLSTM expands the network’s input by encoding data in both forward and backward directions. Classifiers like Support Vector Machine (SVM) and Naïve Bayes help detect cyberbullying. A working cyberbullying detection system can detect cyberbullying on multiple platforms. A deeper understanding of each machine learning algorithm allows one to build a model that improves upon their predecessors. With models being developed for different attributes providing results with high accuracy, the cyberbullying detection system contributes by leading us to a healthier online community. 展开更多
关键词 Cyberbullying Detection Natural Language Processing (NLP) Text Classification Online Safety Multilingual Detection Systems
在线阅读 下载PDF
A hybrid method for extraction of protein-protein interactions from literature
2
作者 钱伟中 Ungar Lyle +1 位作者 Qin Zhiguang Fu Chong 《High Technology Letters》 EI CAS 2011年第1期32-38,共7页
In this work, a hybrid method is proposed to eliminate the limitations of traditional protein-protein interactions (PPIs) extraction methods, such as pattern learning and machine learning. Each sentence from the bio... In this work, a hybrid method is proposed to eliminate the limitations of traditional protein-protein interactions (PPIs) extraction methods, such as pattern learning and machine learning. Each sentence from the biomedical literature containing a protein pair describes a PPI which is predicted by first learning syntax patterns typical of PPIs from training corpus and then using their presence as features, along with bag-of-word features in a maximum entropy model. Tested on the BioCreAtIve corpus, the PPIs extraction method, which achieved a precision rate of 64%, recall rate of 60%, improved the performance in terms of F1 value by 11% compared with the component pure pattern- based and bag-of-word methods. The results on this test set were also compared with other three extraction methods and found to improve the performance remarkably. 展开更多
关键词 protein-protein interaction PPI) machine learning pattern learning maximum entropy part of speech
在线阅读 下载PDF
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
3
作者 Amardeep Singh Hamad Ali Abosaq +5 位作者 Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa 《Computers, Materials & Continua》 SCIE EI 2024年第4期857-873,共17页
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats. 展开更多
关键词 Cloud encryption RAAS ENSEMBLE threat detection deep learning CYBERSECURITY
在线阅读 下载PDF
Deep Learning-Based Control System Design for Emergency Vehicles through Intersections
4
作者 Dingru Li Yinghui He +1 位作者 Yuanbo Yang Jiale Xu 《Journal of Electronic Research and Application》 2024年第6期208-221,共14页
This paper addresses the challenge of integrating priority passage for emergency vehicles with optimal intersection control in modern urban traffic. It proposes an innovative strategy based on deep learning to enable ... This paper addresses the challenge of integrating priority passage for emergency vehicles with optimal intersection control in modern urban traffic. It proposes an innovative strategy based on deep learning to enable emergency vehicles to pass through intersections efficiently and safely. The research aims to develop a deep learning model that utilizes intersection violation monitoring cameras to identify emergency vehicles in real time. This system adjusts traffic signals to ensure the rapid passage of emergency vehicles while simultaneously optimizing the overall efficiency of the traffic system. In this study, OpenCV is used in combination with Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) to jointly complete complex image processing and analysis tasks, to realize the purpose of fast travel of emergency vehicles. At the end of this study, the principle of the You Only Look Once (YOLO) algorithm can be used to design a website and a mobile phone application (app) to enable private vehicles with emergency needs to realize emergency passage through the application, which is also of great significance to improve the overall level of urban traffic management, reduce traffic congestion and promote the development of related technologies. 展开更多
关键词 Emergency vehicle priority Deep learning Signal light adjustment Traffic congestion reduction Trajectory optimization
在线阅读 下载PDF
Comparative Research in Sentiment Analysis Using Machine Learning Technique
5
作者 Eun Soo Park Rushit Dave Mansi Bhavsar 《Journal of Data Analysis and Information Processing》 2025年第3期269-280,共12页
In today’s digital background,sentiment analysis has become an essential factor of Natural Language Processing(NLP),offering valuable insights from vast online data sources.This paper presents a comparative analysis ... In today’s digital background,sentiment analysis has become an essential factor of Natural Language Processing(NLP),offering valuable insights from vast online data sources.This paper presents a comparative analysis of sentiment analysis techniques leveraging machine learning.As digital content continues to expand rapidly,decoding public sentiment has become increasingly important for businesses and researchers.The study examines various approaches,including traditional machine learning methods like Support Vector Machines(SVM)and Na飗e Bayes(NB),as well as deep learning models such as Convolutional Neural Networks(CNN)and Long Short-Term Memory(LSTM)networks.It also explores hybrid frameworks that combine the strength of both paradigms.By evaluating the advantages and limitations of these models,especially within the context of e-commerce,this review provides a comprehensive understanding of their performance.Additionally,the paper addresses critical challenges such as real-time sentiment detection and multi-label classification.Through a synthesis of existing research,it highlights promising directions for future work and contributes to the development of more accurate and practical sentiment analysis solutions across various applications. 展开更多
关键词 Sentiment Analysis Machine Learning Deep Learning
在线阅读 下载PDF
New Advanced Computing Architecture for Cryptography Design and Analysis by D-Wave Quantum Annealer 被引量:1
6
作者 Xiangmin Ji Baonan Wang +2 位作者 Feng Hu Chao Wang Huanguo Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第4期751-759,共9页
Universal quantum computers are far from achieving practical applications.The D-Wave quantum computer is initially designed for combinatorial optimizations.Therefore,exploring the potential applications of the D-Wave ... Universal quantum computers are far from achieving practical applications.The D-Wave quantum computer is initially designed for combinatorial optimizations.Therefore,exploring the potential applications of the D-Wave device in the field of cryptography is of great importance.First,although we optimize the general quantum Hamiltonian on the basis of the structure of the multiplication table(factor up to 1005973),this study attempts to explore the simplification of Hamiltonian derived from the binary structure of the integers to be factored.A simple factorization on 143 with four qubits is provided to verify the potential of further advancing the integer-factoring ability of the D-Wave device.Second,by using the quantum computing cryptography based on the D-Wave 2000 Q system,this research further constructs a simple version of quantum-classical computing architecture and a Quantum-Inspired Simulated Annealing(QISA)framework.Good functions and a high-performance platform are introduced,and additional balanced Boolean functions with high nonlinearity and optimal algebraic immunity can be found.Further comparison between QISA and Quantum Annealing(QA)on six-variable bent functions not only shows the potential speedup of QA,but also suggests the potential of architecture to be a scalable way of D-Wave annealer toward a practical cryptography design. 展开更多
关键词 Quantum Annealing(QA) FACTORIZATION Boolean functions brain-inspired cognition
原文传递
Analyzing darknet traffic through machine learning and neucube spiking neural networks
7
作者 Iman Akour Mohammad Alauthman +2 位作者 Khalid M.O.Nahar Ammar Almomani Brij B.Gupta 《Intelligent and Converged Networks》 2024年第4期265-283,共19页
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication channels.Effective detection of clandestine darknet traffic is therefore critical yet immensely challeng... The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication channels.Effective detection of clandestine darknet traffic is therefore critical yet immensely challenging.This research demonstrates how advanced machine learning and specialized deep learning techniques can significantly enhance darknet traffic analysis to strengthen cybersecurity.Combining diverse classifiers such as random forest and naïve Bayes with a novel spiking neural network architecture provides a robust foundation for identifying concealed threats.Evaluation on the CIC-Darknet2020 dataset establishes state-of-the-art results with 98%accuracy from the random forest model and 84.31%accuracy from the spiking neural network.This pioneering application of artificial intelligence advances the frontiers in analyzing the complex characteristics and behaviours of darknet communication.The proposed techniques lay the groundwork for improved threat intelligence,real-time monitoring,and resilient cyber defense systems against the evolving landscape of cyber threats. 展开更多
关键词 darknet traffic machine learning deep learning spiking neural network PCA
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部