作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
Significant cybersecurity risks are posed by malware assaults on Windows computers, which call for efficient detection and prevention systems. Supervised machine learning classifiers have shown great promise in the fi...
详细信息
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear...
详细信息
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation learning to an HDI matrix,whose hyper-parameter adaptation can be implemented through a particle swarm optimizer(PSO) to meet scalable ***, conventional PSO is limited by its premature issues,which leads to the accuracy loss of a resultant LFA model. To address this thorny issue, this study merges the information of each particle's state migration into its evolution process following the principle of a generalized momentum method for improving its search ability, thereby building a state-migration particle swarm optimizer(SPSO), whose theoretical convergence is rigorously proved in this study. It is then incorporated into an LFA model for implementing efficient hyper-parameter adaptation without accuracy loss. Experiments on six HDI matrices indicate that an SPSO-incorporated LFA model outperforms state-of-the-art LFA models in terms of prediction accuracy for missing data of an HDI matrix with competitive computational ***, SPSO's use ensures efficient and reliable hyper-parameter adaptation in an LFA model, thus ensuring practicality and accurate representation learning for HDI matrices.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by patient *** third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer *** ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and *** using all three approaches have not been examined till *** researchers found that Machine Learning(ML)techniques can improve ECG *** study will compare popular machine learning techniques to evaluate ECG *** algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization *** plus prior knowledge has the highest accuracy(99%)of the four ML *** characteristics failed to identify signals without chaos *** 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran...
详细信息
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the transmission may be aborted due to insufficient funds(also called balance) or a low transmission rate. To increase the success rate and reduce transmission delay across all transactions, this work proposes a transaction transmission model for blockchain channels based on non-cooperative game *** balance, channel states, and transmission probability are fully considered. This work then presents an optimized channel transaction transmission algorithm. First, channel balances are analyzed and suitable channels are selected if their balance is sufficient. Second, a Nash equilibrium point is found by using an iterative sub-gradient method and its related channels are then used to transmit transactions. The proposed method is compared with two state-of-the-art approaches: Silent Whispers and Speedy Murmurs. Experimental results show that the proposed method improves transmission success rate, reduces transmission delay,and effectively decreases transmission overhead in comparison with its two competitive peers.
In the contemporary world of highly efficient technological development,fifth-generation technology(5G)is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second(Gbps)...
详细信息
In the contemporary world of highly efficient technological development,fifth-generation technology(5G)is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second(Gbps).As far as the current implementations are concerned,they are at the level of slightly below 1 Gbps,but this allowed a great leap forward from fourth generation technology(4G),as well as enabling significantly reduced latency,making 5G an absolute necessity for applications such as gaming,virtual conferencing,and other interactive electronic *** of this change are not limited to connectivity alone;it urges operators to refine their business strategies and offers users better and improved digital *** essential factor is optimization and the application of artificial intelligence throughout the general arrangement of intricate and detailed 5G *** Binary Greylag Goose Optimization(bGGO)to achieve a significant reduction in the feature set while maintaining or improving model performance,leading to more efficient and effective 5G network management,and Greylag Goose Optimization(GGO)increases the efficiency of the machine ***,the model performs and yields more accurate *** work proposes a new method to schedule the resources in the next generation,5G,based on a feature selection using GGO and a regression model that is an ensemble of K-Nearest Neighbors(KNN),Gradient Boosting,and Extra Trees *** ensemble model shows better prediction performance with the coefficient of determination R squared value equal *** proposed framework is supported by several Statistical analyses,such as theWilcoxon signed-rank *** of the benefits of this study are the introduction of new efficient optimization algorithms,the selection of features and more reliable ensemble models which improve the efficiency of 5G technology.
Globally,skin cancer is a prevalent form of malignancy,and its early and accurate diagnosis is critical for patient *** evaluation of skin lesions is essential,but several challenges,such as long waiting times and sub...
详细信息
Globally,skin cancer is a prevalent form of malignancy,and its early and accurate diagnosis is critical for patient *** evaluation of skin lesions is essential,but several challenges,such as long waiting times and subjective interpretations,make this task *** recent advancement of deep learning in healthcare has shownmuch success in diagnosing and classifying skin cancer and has assisted dermatologists in *** learning improves the speed and precision of skin cancer diagnosis,leading to earlier prediction and *** this work,we proposed a novel deep architecture for skin cancer classification in innovative *** proposed framework performed data augmentation at the first step to resolve the imbalance issue in the selected *** proposed architecture is based on two customized,innovative Convolutional neural network(CNN)models based on small depth and filter *** the first model,four residual blocks are added in a squeezed fashion with a small filter *** the second model,five residual blocks are added with smaller depth and more useful weight information of the lesion *** make models more useful,we selected the hyperparameters through Bayesian Optimization,in which the learning rate is *** training the proposed models,deep features are extracted and fused using a novel information entropy-controlled Euclidean Distance *** final features are passed on to the classifiers,and classification results are ***,the proposed trained model is interpreted through LIME-based localization on the HAM10000 *** experimental process of the proposed architecture is performed on two dermoscopic datasets,HAM10000 and *** obtained an improved accuracy of 90.8%and 99.3%on these datasets,***,the proposed architecture returned 91.6%for the cancer *** conclusion,the proposed architecture accuracy is compared with several pre-trained and state-of-the-art
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering *** proposed version employs a network-based reputation system to select the best and most secure path to a *** achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation *** minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation ***,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast *** proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other *** the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing *** paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different ***,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
Autism Spectrum Disorder (ASD) refers to a neuro-disorder wherean individual has long-lasting effects on communication and interaction *** information technologywhich employs artificial intelligence(AI) model has assi...
详细信息
Autism Spectrum Disorder (ASD) refers to a neuro-disorder wherean individual has long-lasting effects on communication and interaction *** information technologywhich employs artificial intelligence(AI) model has assisted in early identify ASD by using pattern *** advances of AI models assist in the automated identification andclassification of ASD, which helps to reduce the severity of the *** study introduces an automated ASD classification using owl searchalgorithm with machine learning (ASDC-OSAML) model. The proposedASDC-OSAML model majorly focuses on the identification and classificationof ASD. To attain this, the presentedASDC-OSAML model follows minmaxnormalization approach as a pre-processing stage. Next, the owl searchalgorithm (OSA)-based feature selection (OSA-FS) model is used to derivefeature subsets. Then, beetle swarm antenna search (BSAS) algorithm withIterative Dichotomiser 3 (ID3) classification method was implied for ASDdetection and classification. The design of BSAS algorithm helps to determinethe parameter values of the ID3 classifier. The performance analysis of theASDC-OSAML model is performed using benchmark dataset. An extensivecomparison study highlighted the supremacy of the ASDC-OSAML modelover recent state of art approaches.
暂无评论