In the realm of Identity and Access Management, access control mechanisms are established to prevent unauthorized entry, ensuring that only authorized entities receive permission to access resources. Among access cont...
详细信息
this study aims to develop, an effective customized Convolutional Neural Network model that can accurately identify areas on CT scans that have lung nodules and those that do not. the study utilizes two datasets, the ...
详细信息
In this study, we embarked on a comparative investigation of Deep learning (DL) techniques and ensemble learning approaches for enhancing IoT security. Specifically, we scrutinized the performance of Multilayer Percep...
详细信息
ISBN:
(纸本)9783031733437;9783031733444
In this study, we embarked on a comparative investigation of Deep learning (DL) techniques and ensemble learning approaches for enhancing IoT security. Specifically, we scrutinized the performance of Multilayer Perceptron (MLP), Long Short-Term Memory (LSTM), Gated Recurrent Units (GRU), Random Forest (RF), and AdaBoost models evaluated to both binary and specific attack vector classifications. the imbalanced and voluminous datasets of UNSW-NB15 and CICIDS2017 were employed for evaluation. the empirical evidence gleaned from our experiments suggests that RF exhibits superior efficacy over its counterparts, with accuracy and F1-score in the range of 99.68% to 99.90%. Within the DL paradigm, the MLP model achieved the highest F1-score (99.17%) and the lowest False Positive Rate (FPR) of 0.0037 using UNSW-NB15, among DL models. Overall, the proposed models exhibit commendable performance in binary classification tasks. However, this does not indicate their suitability for the detection of all types of attacks, as the individual attack detection result shows. Furthermore, models employed in our work demonstrated superior results as compared to existing models that used smaller sample sizes of these datasets.
Disassembling and recycling scrapped products play important roles in effectively reducing environmental pollution and improving resource sustainability. A multi-product human-robot collaborative disassembly-line-bala...
详细信息
Machine Anomalous Sound Detection is crucial for artificial intelligence automation in the context of the fourth industrial revolution. Recent approaches employ self-supervised representation learning, which combines ...
详细信息
Early detection of the onset of a well ceasing to flow was always a challenging task. Liquid loading or well cease to flow problem is the inability of a well to remove liquids that are produced from the wellbore. the ...
详细信息
In the cellular network framework, the resource allocation problem for Device-to-Device (D2D) communication technology is particularly critical. the core issue is how to efficiently allocate channel resources to D2D u...
详细信息
ISBN:
(纸本)9798350390230;9798350390223
In the cellular network framework, the resource allocation problem for Device-to-Device (D2D) communication technology is particularly critical. the core issue is how to efficiently allocate channel resources to D2D users while minimizing interference to cellular users (CU), ensuring the overall performance and Quality of Service (QoS) of the network. To address this challenge, this letter has proposed a resource allocation strategy based on deep reinforcement learning algorithms, aimed at dynamically adjusting channel allocation and transmission power in D2D communication. Firstly, an in-depth study and analysis of the conflicts and interference issues between D2D communication and cellular users in the cellular network environment regarding channel reuse are conducted. By quantitatively analyzing the impact of signal interference on communication quality, key factors requiring optimization are identified. Secondly, Double-Actor Critic (D-AC) algorithm is developed for dynamically allocating communication channels and adjusting transmission power. this algorithm iteratively optimizes D2D channel reuse and power control strategies, aiming to balance the efficient use of channel resources withthe minimization of signal interference. thirdly, the D-AC algorithm is implemented and evaluated for its effectiveness in enhancing system throughput, reducing collision probabilities, and maintaining quality of service standards. By comparing with existing resource management schemes, the advantages of the D-AC algorithm are demonstrated.
this paper studies an energy-efficient task scheduling problem that takes into account the cooperation among service caching-enabled mobile edge computing (MEC) servers. We consider a MEC system consisting of multiple...
详细信息
In light of the accelerated advancement of intelligent hospitality establishments, the effective distribution of room resources has emerged as a pivotal research area, withthe objective of enhancing operational effic...
详细信息
暂无评论