The college management diaspora encapsulates various stakeholders such as students, faculty members, administrative personnel, and other staff. Unfortunately, most of the management workflows are undertaken manually, ...
详细信息
In recent years, global climate change and human activities have intensified the frequency and severity of floods. Based on the big data of flood probability, combined with the index data of monsoon intensity, river m...
详细信息
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features wit...
详细信息
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired *** survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis *** paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific ***,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement *** main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless *** detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural *** this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless *** main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these *** it is very crucial to design an IDS specifically to target on the wireless networks.
The ability to analyze the trend of the stock market has always been paid high attention to. A large number of machine learning technologies have been used for stock analysis and prediction. The traditional time serie...
详细信息
This paper affords a progressive approach to high-pace wide area fiber optic (WAFO) communications by way of combining radio frequency (RF) and optical spectral optimization strategies. This method presents a new appr...
详细信息
Automatic Grammar Error Correction (GEC) models identify and correct a wide range of grammatical errors. Various strategies have been proposed for GEC, with the Neural Machine Translation (NMT) approach being the most...
详细信息
The use of technology in healthcare is becoming increasingly common with the growth of population and advancements in technology. The healthcare industry is integrating engineering principles to create automated syste...
详细信息
The term Internet of Things (IoT) is used to refer as embedded devices or objects with internet access, allowing them to communicate globally, interacting with people and networks. IoT security issues are directly rel...
详细信息
In this paper, we present a blockchain based resource allocation scheme on UAV-assisted communication in vehicular network. Our design aims to minimize the system delay by coordinating the spectrum sharing and power c...
详细信息
Recently, there has been a remarkable interest in sign language recognition techniques. Especially in the field of sensor-based besides the extensive employment of open-source platforms in research and development tes...
详细信息
暂无评论