This paper investigates the secure transmissions in the Unmanned Aerial Vehicle (UAV) communication network facilitated by a Reconfigurable Intelligent Surface (RIS). In this network, the RIS acts as a relay, forwardi...
详细信息
Visual saliency can effectively guide the viewer's visual attention to salient regions of a 3D shape. Incorporating the visual saliency measure of a polygonal mesh into the normal enhancement operation, a novel sa...
详细信息
This paper presents a new approach for intuitive and effective design of periodic symmetric tiles. We observe that planar graphs can effectively represent symmetric tries and graph drawing provides an intuitive paradi...
详细信息
autism spectrum disorder is known as a neurodevelopmental disorder with sensory problems. Many infected adults die frequently due to the psychological conditions they live in. Machine learning helps doctors detect cas...
详细信息
This paper presents a new Intrusion Detection System (IDS) using a 3 layer Convolutional Neural Network (CNN), capable of identifying malicious network traffic. We employ a new injective algorithm to encode network tr...
详细信息
This paper presents a new Intrusion Detection System (IDS) using a 3 layer Convolutional Neural Network (CNN), capable of identifying malicious network traffic. We employ a new injective algorithm to encode network traffic without loss of information. We also include a new algorithm to decode, encoded RGB images back into network traffic. We evaluate the proposed IDS in terms of its computational complexity in for example: time, memory and CPU utilisation for the encoding and decoding algorithms, and its accuracy and loss during training and detection. Lastly, we compare the proposed IDS against a significant IDS algorithm that uses a different approach for encoding, decoding and CNN detection.
This research paper presents a blockchain-based approach for fault detection and secure communication in vehicular ad hoc networks (VANETs). VANETs are an emerging technology that allows vehicles to communicate with e...
详细信息
The growing focus on enhancing color quality in liquid crystal displays(LCDs)and organic light-emitting diodes(OLEDs)has spurred significant advancements in color-conversion ***,color conversion is also important for ...
详细信息
The growing focus on enhancing color quality in liquid crystal displays(LCDs)and organic light-emitting diodes(OLEDs)has spurred significant advancements in color-conversion ***,color conversion is also important for the development and commercialization of *** article provides a comprehensive review of different types of color conversion methods as well as different types of color conversion *** summarize the current status of patterning process,and discuss key strategies to enhance display ***,we speculate on the future prospects and roles that color conversion will play in ultra-high-definition micro-and projection displays.
This paper is focused on several techniques that improve deep neural network (DNN) acoustic modeling for audio corpus indexing in the context of the IARPA Babel program. Specifically, fundamental frequency variation (...
详细信息
We propose a method to learn simultaneously a vector-valued function and a kernel between its components. The obtained kernel can be used both to improve learning performance and to reveal structures in the output spa...
详细信息
ISBN:
(纸本)9781450306195
We propose a method to learn simultaneously a vector-valued function and a kernel between its components. The obtained kernel can be used both to improve learning performance and to reveal structures in the output space which may be important in their own right. Our method is based on the solution of a suitable regularization problem over a reproducing kernel Hilbert space of vector-valued functions. Although the regularized risk functional is non-convex, we show that it is invex, implying that all local minimizers are global minimizers. We derive a block-wise coordinate descent method that efficiently exploits the structure of the objective functional. Then, we empirically demonstrate that the proposed method can improve classification accuracy. Finally, we provide a visual interpretation of the learned kernel matrix for some well known datasets. Copyright 2011 by the author(s)/owner(s).
Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the ***6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address A...
详细信息
Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the ***6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address Auto-configuration ***6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol(ICMPv6).IPv6 is vulnerable to numerous attacks like Denial of Service(DoS)and Distributed Denial of Service(DDoS)which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial ***,an Intrusion Detection System(IDS)is a monitoring system of the security of a network that detects suspicious activities and deals with amassive amount of data comprised of repetitive and inappropriate features which affect the detection rate.A feature selection(FS)technique helps to reduce the computation time and complexity by selecting the optimum subset of *** paper proposes a method for detecting DDoS flooding attacks(FA)based on ICMPv6 messages using a Binary Flower PollinationAlgorithm(BFPA-FA).The proposed method(BFPA-FA)employs FS technology with a support vector machine(SVM)to identify the most relevant,influential ***,The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack *** results show that the proposed method BFPAFA achieved the best accuracy rate(97.96%)for the ICMPv6 DDoS detection with a reduced number of features(9)to half the total(19)*** proven proposed method BFPA-FAis effective in the ICMPv6 DDoS attacks via IDS.
暂无评论