Application fingerprinting is a technique broadly utilized in diverse fields such as cybersecurity, network management, and software development. We discover that the mechanical vibrations of cooling fans for both the...
详细信息
In this paper, classifications using three convolutional neural networks (CNN) are fused together to explore the performance of an identification system. In this system facial, voice, and fingerprint recognition are u...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
Intelligent Transportation Systems rely heavily on the Vehicular Ad-hoc Network to enhance road safety and comfort. This research proposes and evaluates an intelligent backoff management scheme, utilizing Adaptive Neu...
详细信息
There are numerous consumer-oriented and retail spaces that use cash registers and POS systems, such as restaurants, grocery stores, department stores, etc. The typical cashier working in a retail environment will fin...
详细信息
Battery energy storage systems (BESS) will play a critical role in the modern power system (MPS) with high penetration of renewable energy resources. In MPS energy paradigm, it is required to deploy and integrate BESS...
详细信息
According to the World Health Organization, at least 2.2 billion people suffer from near or distance vision impairment, and this number is expected to increase as the population ages. The prevalence of vision impairme...
详细信息
An approach for deflection of the main radiation of the end-fire dipole antenna in a specific direction by changing the effective constitutive parameters of metamaterials are introduced. The concept of this phenomenon...
详细信息
The study suggests a scalable method for estimating residential power usage. To increase the forecasting accuracy, an SVM (support vector machine) based technique combines many machine learning models, such as random ...
详细信息
Compressive sensing reconstruction techniques have been used to estimate the arrivals of correlated or uncorrelated signals impinging on a uniformly or nonuniformly space linear or circular arrays. DOA is accomplished...
详细信息
暂无评论