This study highlights the utility of blockchain, the internet of Things (IoT) and FinTech in cold chain/post-harvest supply chain. Blockchain technology will enable the stakeholders in a post-harvest supply chain to t...
详细信息
Cloud computing, which moves assets from desktop setting to cloud infra-structure—where apps are kept in a "cloud" with massive processing power and nearly infinite database storage—has fundamentally alter...
详细信息
Over the past two decades, the commercial landscape has undergone a transformation, shifting from traditional marketing methods to digital and internet-based platforms. This shift, while boosting economic potential, h...
详细信息
VoIP is a revolutionary technology for transmission of voice over internet protocol than from plain telephony systems. But current VoIP solutions have some important issues which are packet loss, latency, and jitter e...
详细信息
Human food needs are increasing all the time. This condition is in line with the increasing world population and exacerbated by climate change. Agricultural products are one of the sources of food to meet food needs. ...
详细信息
The rapid development of computer networks, such as the internet, has caused a sea change in the ways in which people communicate and share information. The advent of widespread computer networks like the internet has...
详细信息
ISBN:
(纸本)9798331505745
The rapid development of computer networks, such as the internet, has caused a sea change in the ways in which people communicate and share information. The advent of widespread computer networks like the internet has caused a sea change in traditional modes of communication and information sharing. On the other hand, this technical progress has also opened the door for malicious actors to take advantage of loopholes and steal sensitive information, disrupt operations, etc. Therefore, intrusion detection systems (IDSs) are essential for screening harmful traffic and warding off frequent attacks. These algorithms used to work by comparing current attacks to those of the past or by following a predetermined set of rules. But now that data and computing power are more accessible than ever before, machine learning seems to be the way to go. In this study, to present DSAM-CGLSTM, a dual-staged attention mechanism based on conversion-gated Long Short Term Memory network, to capture both short-term mutation and long-term dependence info in the study dataset. To enhance the network's capacity to retrieve the short-term mutation information, hyperbolic tangent functions are incorporated into the input-gate and forget-gate of LSTM. Additionally, the network incorporates a dual-staged attention mechanism, which encompasses both input attention and temporal attention. Consequently, a novel algorithm for optimising the parameters of DSAM-CGLSTM, SSA, has been suggested in this research, which is based on metaheuristics. to use a single Jupyter notebook in the Google Colaboratory environment to conduct the entire experiment. to imported and then implemented the necessary software packages, including seaborn, pandas, matplotlib, keras, besides Tensor Flow, and to used the CICIDS 2017 dataset. During the model's training and validation processes, accuracy and loss were taken into account as performance indicators. With a 98.85% accuracy score, the deep learning model performed quit
In this study, the reasearch is focused on the simulation of vehicular communication networks, especially intelligent traffic systems, to enhance dependability, safety, and optimality in communication. The simulation ...
详细信息
Smart sensing environments supported by an internet of Things (IoT) infrastructure are enabling a wide array of possibilities for data-intensive remote monitoring applications. Although nowadays it is possible to acce...
详细信息
Transmission Control Protocol (TCP) is a fundamental protocol in the internet Protocol Suite, responsible for establishing reliable data transmission between devices in network communication. This study models TCP con...
详细信息
The study investigates how quantum cryptography can be employed to improve security in smart grid communication networks. Attempting to use the BB84 QKD protocol, it allows secure creation and management of those cryp...
详细信息
暂无评论