Green Vehicular Ad-hoc Networks (VANETs) are gaining significance in smart mobility because of growing concerns about the environment. The research introduces a novel method for managing traffic in such networks by co...
详细信息
There is a considerably vast communication gap between deaf and hearing individuals, and one potential solution is the development of American Sign Language (ASL) recognition technology. While methods utilizing deep l...
详细信息
This research introduces a comprehensive suite of resource management algorithms tailored for mobile, wireless, and ad-hoc networks. The suite comprises the Dynamic Resource Allocation (DRA), Intelligent Energy-Aware ...
详细信息
To address the matching problem caused by the salience differences in spatial features, spectrum and contrast between heterologous images, a heterologous image matching method based on salience region using Q-test and...
详细信息
This study demonstrates the application of second-generation quantum sensors in one-dimensional tracking. Due to their compact size, these magnetic field-sensitive sensors are particularly advantageous for medical and...
详细信息
Top-k dominance (TKD) query is an extended query method of skyline query and top-k query, which reveals the top-k dominant individuals in an incomplete dataset by analyzing the dominance relationships between individu...
The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptio...
详细信息
The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptions. Conventional detection approaches face challenges in keeping up with the ever-changing strategies of cyber-attacks, resulting in heightened susceptibility and significant harm to network infrastructures. In order to tackle this urgent issue, this project focused on developing an effective anomaly detection system that utilizes Machine Learning technology. The suggested model utilizes contemporary machine learning algorithms and frameworks to autonomously detect deviations from typical network behaviour. It promptly identifies anomalous activities that may indicate security breaches or performance difficulties. The solution entails a multi-faceted approach encompassing data collection, preprocessing, feature engineering, model training, and evaluation. By utilizing machine learning methods, the model is trained on a wide range of datasets that include both regular and abnormal network traffic patterns. This training ensures that the model can adapt to numerous scenarios. The main priority is to ensure that the system is functional and efficient, with a particular emphasis on reducing false positives to avoid unwanted alerts. Additionally, efforts are directed on improving anomaly detection accuracy so that the model can consistently distinguish between potentially harmful and benign activity. This project aims to greatly strengthen network security by addressing emerging cyber threats and improving their resilience and reliability.
In analyzing and recognizing wrist pulse signals, it isn’t easy to mine the nonlinear information of wrist pulse signals using analysis methods such as time and frequency. Traditional machine learning methods require...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and *** learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit *** intrusion detection system controls the flow of network traffic with the help of computer *** deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network *** this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network *** Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious *** proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection.
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access *** privacy of health data can only be preserved by keep...
详细信息
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access *** privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective ***-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud ***,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious *** a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE *** the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain ***,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical *** the assistance of blockchain technology,the proposed scheme offers two main ***,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of ***,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain ***,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus *** eliminates the need of the trusted authority and reduces the burden of data users,***,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret
暂无评论