![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
HFCCW: A Novel Hybrid Filter-Clustering-Coevolutionary Wrapper Feature Selection Approach for Network Anomaly Detection
Network anomaly detection (NAD) is a crucial Artificial Intelligence (AI)-based security solution for protecting computer networks. However, analyzing high-dimensional data is a significant impediment for NAD ...
-
Article
A comprehensive evaluation of feature-based AI techniques for deepfake detection
In the contemporary era, where data and information are the key source in every domain, it becomes imperative to identify, detect and distinguish between fake and authentic content available online. Recent tec...
-
Article
Flow Directions and Ages of Subsurface Water in a Salt Marsh System Constrained by Isotope Tracing
Salt marshes are dynamic hydrologic systems where terrestrial groundwater, terrestrial surface water, and seawater mix due to bi-directional flows and pressure gradients. Due to the counteracting terrestrial a...
-
Article
Open AccessThe environmental controls on efficiency of enhanced rock weathering in soils
Enhanced rock weathering (ERW) in soils is a promising carbon removal technology, but the realistically achievable efficiency, controlled primarily by in situ weathering rates of the applied rocks, is highly u...
-
Article
Open AccessRiver thorium concentrations can record bedrock fracture processes including some triggered by distant seismic events
Fractures are integral to the hydrology and geochemistry of watersheds, but our understanding of fracture dynamics is very limited because of the challenge of monitoring the subsurface. Here we provide evidenc...
-
Article
Open AccessLong-term missing value imputation for time series data using deep neural networks
We present an approach that uses a deep learning model, in particular, a MultiLayer Perceptron, for estimating the missing values of a variable in multivariate time series data. We focus on filling a long cont...
-
Chapter and Conference Paper
Composition of Static and Dynamic Analysis for Algorithmic-Level Code Semantic Optimization
Program optimization can be done at various levels like design, algorithm, data structure, source code, and run time. It can be based on various parameters like time, space, and code complexity. Higher the lev...
-
Chapter and Conference Paper
Deep Learning Techniques Used for Fake News Detection: A Review and Analysis
People can quickly obtain and publish the news through many platforms, i.e. social media, blogs, and websites, among others. Everything that is available on these platforms in not credible and it became impera...
-
Chapter and Conference Paper
Machine Learning Techniques for Image Manipulation Detection: A Review and Analysis
Low-cost modified or tampered image enhancement processes and advanced multimedia technologies are becoming easily obtainable as image editing methods, different editing software, and image altering tools are ...
-
Chapter and Conference Paper
Framework for Detection of Malware Using Random Forest Classifier
Malware poses a challenging threat to this digital world of communication, as it can manipulate or perform any baffling activity inside a computer by corrupting important files and disabling the network system...
-
Article
Combating multimodal fake news on social media: methods, datasets, and future perspective
The growth in the use of social media platforms such as Facebook and Twitter over the past decade has significantly facilitated and improved the way people communicate with each other. However, the information...
-
Chapter and Conference Paper
Cyber Threat Intelligence “Comparative Analysis of Its Sources and Parameters of Evaluation”
Cyber threat intelligence plays a significant role in defending against the ever increasingly frequent, varied and sophisticated cyber-attacks. Threat intelligence is information about the cyber threats and th...
-
Chapter and Conference Paper
Stemming Techniques on English Language and Devanagari Script: A Review
Natural language processing (NLP) is the branch of artificial intelligence, computer science, and linguistics which is used to understand and determine implications to human languages in a keen and valuable wa...
-
Chapter and Conference Paper
A Review of Credit Card Fraud Detection Techniques
In today’s world, people are more inclined towards online shop** and payment, which is leading to an increase in the number of credit card users worldwide. And in the result of that, fraudsters are also find...
-
Chapter
Hot Spots and Hot Moments in the Critical Zone: Identification of and Incorporation into Reactive Transport Models
Biogeochemical processes are often spatially discrete (hot spots) and temporally isolated (hot moments) due to variability in controlling factors like hydrologic fluxes, lithological characteristics, bio-geomo...
-
Article
Surrogate optimization of deep neural networks for groundwater predictions
Sustainable management of groundwater resources under changing climatic conditions require an application of reliable and accurate predictions of groundwater levels. Mechanistic multi-scale, multi-physics simu...
-
Article
Microbially mediated kinetic sulfur isotope fractionation: reactive transport modeling benchmark
Microbially mediated sulfate reduction is a ubiquitous process in many subsurface systems. Isotopic fractionation is characteristic of this anaerobic process, since sulfate-reducing bacteria (SRB) favor the re...
-
Article
Stable and radioactive carbon isotope partitioning in soils and saturated systems: a reactive transport modeling benchmark study
This benchmark provides the first rigorous test of a three-isotope system [12C, 13C, and 14C] subject to the combined effects of radioactive decay and both stable equilibrium and kinetic fractionation. We present...
-
Chapter and Conference Paper
Feature Selection and Extraction for Dogri Text Summarization
Text summarization is defined as the process of condensing information from the source text into a shorter form without affecting the context of the information. Based on the summary generated by the summariza...
-
Chapter and Conference Paper
Hybridization of Energy-Efficient Clustering and Multi-heuristic Strategies to Increase Lifetime of Network—A Review
Wireless sensor network has significant applications but few flaws also exist. The flaw of sensor energy consumption requires to be tackled. The sensor is an integrated component of WSN that is used to collect...