A Semantic Tree-Based Fast-Moving Object Trajectory Tracking Algorithm for Table Tennis

Z Jin, T Zou, D Sun, Y Yang, J Liu - International Journal on Semantic …, 2024 - igi-global.com
Table tennis is a popular sport around the world. A key technology in table tennis education
and analysis system is reconstructing the trajectory of the fast-moving ball from videos …

Personalized POI Recommendation Using CAGRU and Implicit Semantic Feature Extraction in LBSN

H Ye, Y Chen - International Journal on Semantic Web and …, 2024 - igi-global.com
With the intention of addressing the concern that existing point of interest recommendation
methods fail to fully utilize the auxiliary information of the point of interest, from which it is …

FuzzyBack—A Hybrid Neuro-Fuzzy Ensemble for Concept Drift Adaptation in Stream Mining Using Neural Network

S Sarin, SK Singh, S Kumar, U Chauhan… - … conference on soft …, 2023 - Springer
The prevalence of continuous data streams in various domains has posed new challenges
in stream mining, particularly with the presence of concept drift. Concept drift is the phrase …

Deep learning based phishing website detection

N Subhashini, A Banerjee, A Kumar… - TELKOMNIKA …, 2024 - telkomnika.uad.ac.id
Phishing attacks use fraudulent websites that trick people into disclosing sensitive
information. More effective and precise methods are required to identify phishing websites …

[PDF][PDF] MAPPING THE PHISHING ATTACKS RESEARCH LANDSCAPE: A BIBLIOMETRIC ANALYSIS AND TAXONOMY

M MUTLUTÜRK, B METIN - Journal of Theoretical and Applied Information …, 2023 - jatit.org
Phishing attacks represent a worldwide issue that requires a comprehensive, global strategy
to tackle. Delving into international scholarly research on phishing incidents allows us to …

Creating a Binary AHA Algorithm with Varied Transfer Function

P Dhapola, V Kumar - International conference on soft computing for …, 2023 - Springer
To solve binary problems different optimization algorithms are converted to their binary
version. In this research, we developed a binary optimization technique employing a …

A Proposed Darknet Traffic Classification System Based on Max Voting Algorithms

A Almomani, M Alauthman, M Alkasassbeh… - … Conference on Cyber …, 2021 - Springer
The darknet refers to an anonymous address space on the Internet where people do not
expect to interact with their computers so that it is considered malicious and provides them …

Development of Enhanced Chimp Optimization Algorithm (OFCOA) in Cognitive Radio Networks for Energy Management and Resource Allocation

DKJB Saini, A Mishra, D Siddharth, P Joshi… - International Journal of …, 2023 - igi-global.com
Transmit time and power optimisation increase secondary network energy efficiency (EE).
The optimum resource allocation strategy in cognitive radio networks is the enhanced chimp …

Combating Phishing in the Age of Fake News: A Novel Approach with Text-to-Text Transfer Transformer

Y Ma, G Dobbie, NAG Arachchilage - … of the 1st Workshop on Security …, 2024 - dl.acm.org
In the digital landscape, where fake news proliferates across online platforms, it not only
distorts public discourse but also paves the way for sophisticated cyber threats, particularly …

Verification of Genuineness of Educational Internet Resources Using Machine Learning Methods

AN Privalov, VA Smirnov - 2024 4th International Conference …, 2024 - ieeexplore.ieee.org
The analysis of various sources has been carried out, confirming the demand for protective
solutions against information threats from fake websites of organizations. The relevance of …