The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries in digital platforms to facilitate their ***,IIoT is being used in various industrial fields such as logistics,manufacturing,metals and mining,gas and oil,transportation,aviation,and energy *** is mandatory that various industrial fields require highly reliable security and preventive measures against *** detection is defined as the detection in the network of security threats targeting privacy information and sensitive *** Detection Systems(IDS)have taken an important role in providing security in the field of computer *** of intrusion is completely based on the detection functions of the *** an IIoT network expands,it generates a huge volume of data that needs an IDS to detect intrusions and prevent network *** research works have been done for preventing network *** day,the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly *** this regard,this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA(WDLDA).The implemented WDLDA results in a rate of detection accuracy(DRA)of 97%and a false positive rate(FPR)of 11%using the Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD)dataset.
The IoT represents a great opportunity for tourism and hospitality to increase customer satisfaction while simulta-neously reducing operational costs. Smart tourism involves using smart technology and practices to boo...
详细信息
With the growing use of deep learning models in medical imaging, it is critical to interpret these models to ensure precise diagnoses. A recent study using the SARS-COV2 dataset evaluated the efficiency of several Exp...
详细信息
Pattern-based, password-based, and PIN-based authentication techniques are typically the most common among smartphone users. However, according to prior studies these authentication techniques are susceptible to keylo...
详细信息
This article summarizes the Blockchain technology along with the artificial intelligence. The cutting edge technology is described in a elaborated manner along with its advantages, disadvantages and its impact with th...
详细信息
The paper presents a novel framework for optimizing LoRaWAN gateway placement to enhance network performance and reliability. By integrating Network Time Protocol (NTP) for global synchronization and Precision Time Pr...
详细信息
Sentiment analysis provides an insight of the public’s emotions towards governments, organizations, product developers etc. Word embedding is a group of feature learning techniques transferring the raw textual data i...
详细信息
The principal features of cloud computing are dynamic resource allocation and its pricing nature. This paper implies an algorithm that provides resources based on the demand to users in the cloud infrastructure as a s...
详细信息
Diabetes is one of the increasing chronic diseases that must be treated well as soon as it is detected. In today's world, diabetes is the most occurring disease. Diabetes is mainly of two types: Type 1 and Type 2 ...
详细信息
In the realm of smart agriculture, our primary objective is to enhance security in the agriculture field by combining IoT and computer vision technologies. By leveraging these advanced tools, we strive to protect fiel...
详细信息
暂无评论