Abstract-Weapon-target assignment (WTA) is a combinatorial optimization problem and is known to be NPcomplete. The WTA aims to best assignment of weapons to targets to minimize the total expected value of the surviving targets. Exact methods can solve only small-size problems in a reasonable time. Although many heuristic methods have been studied for the WTA in the literature, a few parallel methods have been proposed. This paper presents parallel simulated algorithm (PSA) to solve the WTA. The PSA runs on GPU using CUDA platform. Multi-start technique is used in PSA to improve quality of solutions. 12 problem instances (up to 200 weapons and 200 targets) generated randomly are used to test the effectiveness of the PSA. Computational experiments show that the PSA outperforms SA on average and runs up to 250x faster than a single-core CPU.
With the vast amount of data and information difficult to deal with, especially in the health system, machine learning algorithms and data mining techniques have an important role in dealing with data. In our study, we used machine learning algorithms with thyroid disease. The goal of this study is to categorize thyroid disease into three categories: hyperthyroidism, hypothyroidism, and normal, so we worked on this study using data from Iraqi people, some of whom have an overactive thyroid gland and others who have hypothyroidism, so we used all of the algorithms. Support vector machines, random forest, decision tree, naïve bayes, logistic regression, k-nearest neighbors, multi-layer perceptron (MLP), linear discriminant analysis. To classification of thyroid disease.
Deep Learning (DL) is the most efficient technique to handle a wide range of challenging problems such as data analytics, diagnosing diseases, detecting anomalies, etc. The development of DL has raised some privacy, justice, and national security issues. Deepfake is a DL-based application that has been very popular in recent years and is one of the reasons for these problems. Deepfake technology can create fake images and videos that are difficult for humans to recognize as real or not. Therefore, it needs to be proposed some automated methods for devices to detect and evaluate threats. In another word, digital and visual media must maintain their integrity. A set of rules used for Deepfake and some methods to detect the content created by Deepfake have been proposed in the literature. This paper summarizes what we have in the critical discussion about the problems, opportunities, and prospects of Deepfake technology. We aim for this work to be an alternative guide to getting knowledge of Deepfake detection methods. First, we cover Deepfake history and Deepfake techniques. Then, we present how a better and more robust Deepfake detection method can be designed to deal with fake content.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.