The majority of the recent research on text similarity has been focused on machine learning strategies to combat the problem in the educational environment. When the originality of an idea is copied, it increases the difficulty of using a plagiarism detection system in practice, and the system fails. In cases like active-to-passive conversion, phrase structure changes, synonym substitution, and sentence reordering, the present approaches may not be adequate for plagiarism detection.
View Article and Find Full Text PDFSegmenting brain tumors in 3D magnetic resonance imaging (3D-MRI) accurately is critical for easing the diagnostic and treatment processes. In the field of energy functional theory-based methods for image segmentation and analysis, level set methods have emerged as a potent computational approach that has greatly aided in the advancement of the geometric active contour model. An important factor in reducing segmentation error and the number of required iterations when using the level set technique is the choice of the initial contour points, both of which are important when dealing with the wide range of sizes, shapes, and structures that brain tumors may take.
View Article and Find Full Text PDFTo combat malicious domains, which serve as a key platform for a wide range of attacks, domain name service (DNS) data provide rich traces of Internet activities and are a powerful resource. This paper presents new research that proposes a model for finding malicious domains by passively analyzing DNS data. The proposed model builds a real-time, accurate, middleweight, and fast classifier by combining a genetic algorithm for selecting DNS data features with a two-step quantum ant colony optimization (QABC) algorithm for classification.
View Article and Find Full Text PDF