Malware is a severe danger to everyone from home users to huge corporations. As a result, it's a popular research topic. Malware fingerprints and activity patterns are analyzed both statically and dynamically to d...
详细信息
Fog computing is a cloud computing extension that processes data locally on a device rather than uploading it to the cloud, which would speed up processing and lessen the strain on the Internet. We discuss fog computi...
详细信息
In service computing, platforms like IFTTT, Zapier, and Omelette enable users to create customized workflows. However, this flexibility brings challenges like security, trust, and efficiency. Recommending components a...
详细信息
Incorporating extra-textual context such as film metadata into the machine translation (MT) pipeline can enhance translation quality, as indicated by automatic evaluation in recent work. However, the positive impact o...
详细信息
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue...
详细信息
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulnerable to numerous attacks that wreak havoc on their performance than any network. Traditional cryptography techniques cannot entirely defend MANETs in terms of fresh attacks and vulnerabilities due to the distributed architecture of MANETs;however, these issues can be overcome by using machine learning approaches-based intrusion detection systems (IDS). IDS, typically screening system processes and identifying intrusions, are commonly employed to supplement existing security methods because preventative techniques are never enough. Because MANETs are continually evolving, their highly limited nodes, and the lack of central observation stations, intrusion detection is a complex and tough process. Conventional IDSs are difficult to apply to them. Existing methodologies must be updated for MANETs or new approaches must be created. This paper aims to present a novel concept founded on deep belief networks (DBN) and long shortterm memory (LSTM) for MANET attack detection. The experimental analysis was performed on the probe, root to local, user to root, and denial of service (DoS) attacks. In the first phase of this paper, particle swarm optimization was used for feature selection, and subsequently, the DBN and LSTM were used for the classification of attacks in the MANET. The experimental results gave an accuracy reaching 99.46%, a sensitivity of 99.52%, and a recall of 99.52% for D
Innovation is the center of the enterprise development, which is the main driving force of enterprises’ competitiveness. To evaluate the enterprises’ innovation ability, we firstly establish an index system which ai...
详细信息
Innovation is the center of the enterprise development, which is the main driving force of enterprises’ competitiveness. To evaluate the enterprises’ innovation ability, we firstly establish an index system which aims at analyzing the enterprise innovation ability. We also retrieve the data of the listed companies in Wind database from 2015 to 2019 and label them using factor analysis method. Then, a new deep learning classificational framework with attention mechanism and LSTM is established. The results show that when attention mechanism and LSTM are added into the convolutional neural network(CNN), the model’s prediction performance is better improved, and the accuracy, recall, precision and F-score are 0.914, 0.914, 0.916 and 0.915, respectively. This indicates the strong generalization ability of our new model. Finally, we also find that patents and R &D expenditures are the most important factor affecting the corporate innovation ability through SHapley Additive exPlanations(SHAP). Companies with more patents and R &D expenditures are generally considered to be more innovative.
In today’s information technology era, education must adapt to a rapidly changing world. Teachers should transition from mere information providers to active learning facilitators, ensuring knowledge is practical, pu...
详细信息
Outlier Features (OFs) are neurons whose activation magnitudes significantly exceed the average over a neural network's (NN) width. They are well known to emerge during standard transformer training and have the u...
Current methods in mapping the availability of WiFi networks, such as crowdsourcing platforms (e.g. Project BASS and CoverageMap) and dedicated wardriving, face limitations in terms of data recency, volume, and cost-e...
详细信息
Sensitising language models (LMs) to external context helps them to more effectively capture the speaking patterns of individuals with specific characteristics or in particular environments. This work investigates to ...
详细信息
暂无评论