Internet of Things (IoT) malware detection has become a significant cybersecurity challenge due to the expansion of the threat landscape brought about by the proliferation of IoT devices. IoT malware is growing more c...
详细信息
Internet of Things (IoT) malware detection has become a significant cybersecurity challenge due to the expansion of the threat landscape brought about by the proliferation of IoT devices. IoT malware is growing more complex and dynamic every day, making traditional signature-based detection techniques ineffective against it. By using large-scale data generated by IoT devices to identify patterns and anomalies, machinelearning (ML) techniques present a promising way to detect IoT malware. The process of developing effective machinelearning models to identify malware for Internet of Things, however, can be difficult and time-consuming owing to the requirementfor meticulous preprocessing,feature engineering, model selection, and ***, a pipeline techniquecombined with machinelearning to detect IoT malware is presented in a comprehensive way. In order to increase the resilience and accuracy of the detection system, specific methods are used like data cleaning, dimensionality reduction, ensemble learning and cross validation. Standard Dataset UNSW_NB15 is used to evaluate proposed models like XGBoost Classifier, AdaBoost Classifier, Random Forest, ExtraTrees Classifier and Stochastic Gradient Descent(SGD).
The proceedings contain 33 papers. The special focus in this conference is on machinelearning, advances in Computing, Renewable Energy and Communication. The topics include: Enhancing Power Quality in Grid-Tied Solar...
ISBN:
(纸本)9789819752300
The proceedings contain 33 papers. The special focus in this conference is on machinelearning, advances in Computing, Renewable Energy and Communication. The topics include: Enhancing Power Quality in Grid-Tied Solar Photovoltaic systems;RF-TSVM: Random Forest-Based Transductive Support Vector machine for Classification and Prediction of Cancer Patterns;resource-Efficient Image Retrieval: A Study of Local Patterns Versus Deep learning Models;machine Translation of Chinese–Hindi Simple Sentences Using Moses;Innovative Approaches to Reduce Carbon Footprint and Air Pollution: The Role of AI, ML, Cloud Computing, and IoT;investigating Sensor Technology and Benefits of Intelligent Transport systems;student Attendance System by Quick Responsive Code;analysis of Brain Tumor Detection Using machinelearning;a Review on Multiple Face Detection Techniques and Challenges;blockchain-Enabled Secure Identity Verification in Agri-Food Supply Chain;machinelearning Approach for Diagnosis of Schizophrenia Using EEG Signals;Comparative Analysis of Web APIS: RESTful and GraphQL;AI-Based Vision Screening Tool for Keratoconus;synergizing Artistry and Technology by Unveiling the Integration of Matte Painting Techniques in Crafting Precise and Immersive Visual Effects Backgrounds;Heart Disease Prediction: A Comprehensive Exploration of Optimal Predictive AI;dynamic Animation Scaling: Design and Development of Adaptive Character Animations for Varying Sizes;framework for Assessment of Greywater-Assisted Composting Using IoT-Based Sensors;mood-Based Movie Recommendation System Using Sentiment Analysis;blockchain-Enabled Consensus Mechanisms for Data Integrity and Security in Edge and Cloud Computing Environments;AI-Based Question Paper Analysis and Generator with Authentication;pomegranate Leaf Fruit Disease Prediction Using machinelearning;price Prediction Using machinelearning Approaches.
The proceedings contain 177 papers. The topics discussed include: weather prediction model using ridge regression;continuous gesture recognition in human-computer interaction through real-time machinelearning models;...
ISBN:
(纸本)9798350388602
The proceedings contain 177 papers. The topics discussed include: weather prediction model using ridge regression;continuous gesture recognition in human-computer interaction through real-time machinelearning models;an effective implementation and comparative analysis of mobile robot path planning algorithms;advanced machinelearning algorithms for predictive analytics in healthcare to enhance patient outcomes with data-driven insights;blockchain-powered decentralized resource allocation and management for cloud computing;an hand gesture smart translation system for differently abled people;smart iridology: deep learning for predictive health insights;and early detection of stem bleeding in coconut trees using image processing.
Conventional deep learning methods have considerable hurdles when it comes to Human-machine Interaction (HMI) and gesture identification in noisy and uncertain situations. A Fuzzy Logic-Based Deep learning (Fuzzy DL) ...
详细信息
This research proposal aims to employ machinelearning techniques to analyze employee retention factors in Software Companies, recognizing its crucial role in organizational success and the potential costs of high tur...
详细信息
The integration of machinelearning into predictive maintenance strategies has revolutionized how industries manage equipment reliability & performance. This abstract examines the role of machinelearning algorith...
详细信息
Predicting the Indian stock market with accuracy is a considerable challenge, mainly due to its nonlinear time series nature. Nevertheless, the advent of diverse machinelearning methodologies has sparked an extensive...
详细信息
machinelearning (ML) - enabled systems capture new frontiers of industrial use. The development of such systems is becoming a priority course for many vendors due to the unique capabilities of Artificial Intelligence...
详细信息
ISBN:
(纸本)9798400705915
machinelearning (ML) - enabled systems capture new frontiers of industrial use. The development of such systems is becoming a priority course for many vendors due to the unique capabilities of Artificial Intelligence (AI) techniques. The current trend today is to integrate ML functionality into complex systems as architectural components. There are a lot of relevant challenges associated with this strategy in terms of the overall system architecture and in the context of development workflow (MLOps). The probabilistic nature, crucial dependency on data, and work in an environment of high uncertainty do not allow software engineers to apply traditional software development methodologies. As a result, there is a community request to systematize the most relevant experience in building software architectures with ML components, to create new approaches to organizing the process of developing ML-enabled systems, and to build new models for assessing the system quality. Our research contributes to all mentioned directions and aims to create a methodology for the efficient implementation of ML-enabled software and AI components. The results of the research can be used in the design and development in industrial settings, as well as a basis for further studies in the research field, which is of both practical and scientific value.
machinelearning is one of the most popular advancements in technology which is being widely used in various domains, including healthcare, avionics, automotive, business, education, etc. A machinelearning approach w...
详细信息
ISBN:
(纸本)9798350381689
machinelearning is one of the most popular advancements in technology which is being widely used in various domains, including healthcare, avionics, automotive, business, education, etc. A machinelearning approach works by learning the required knowledge from the data to be supplied by a client system. In a typical scenario, a client entrusts a third-party agency to develop a machinelearning application and shares the data to the developer to enable the development of a machinelearning application. This is badly affecting the privacy of data as a third-party is getting access to sensitive data from a client system. Therefore, an effective data encoding technique is required to ensure the privacy of sensitive data while enabling a third-party agency to develop a machinelearning application on the encoded data. Existing data masking/encoding techniques such as pseudonymization, anonymization and substitution are badly affecting the machinelearning process as the modification they do for masking data is preventing a machinelearning approach to learn the required knowledge. Another approach known in the literature is Fully Homomorphic Encryption. But, there is no tool available based on this technique which enables a client system to mask sensitive data before giving it to a third-party machinelearning developer. We failed to obtain the expected outcome from an off-the-shelf machinelearning classifier when we tried to classify a benchmark dataset masked using an available implementation of Fully Homomorphic Encryption. Since enough details about the implementation is not available, we could not find and fix the issues which is causing this problem. We propose a technique based on which we implemented a tool which provides an easy-to-use Graphical User Interface enabling the client to mask sensitive data before giving it to a third-party agency for developing a machinelearning Application. Our tool enables a client to mask sensitive data through few mouse click
Bangladesh has a large population, which is causing the delivery system to grow up, day by day. Therefore, several companies that provide these delivery services usually referred to as 'Currier Service', are g...
详细信息
暂无评论