Accurate prediction of above ground biomass (AGB) is critical for monitoring forest health and carbon cycling. It is crucial for understanding and managing forest ecosystems. In this paper, we propose an enhanced fram...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets ...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected *** detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual *** learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device *** addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to *** ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT *** overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)*** GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT *** data preprocessing,the min-max data normalization approach is primarily *** GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature ***,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet ***,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM *** experimental validation of the GTODL-BADC technique can be tested on a benchmark *** simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.
The advancement of automated number plate recognition (ANPR) systems has garnered noteworthy attention in recent times owing to their diverse applications across multiple domains, including traffic management, parking...
详细信息
Small UAVs pose security risks to sensitive areas and individuals due to their rapid movement and wide coverage capabilities. Effective monitoring necessitates the deployment of lightweight and energy-efficient survei...
详细信息
Sugarcane leaf diseases are major agricultural issues that lead to reduced production and economic losses. Early detection is crucial for controlling their spread. This study introduces a solution for identifying suga...
详细信息
Image inpainting has made great achievements recently, but it is often tough to generate a semantically consistent image when faced with large missing areas in complex scenes. To address semantic and structural alignm...
详细信息
This paper comprehensively analyzes the Manta Ray Foraging Optimization(MRFO)algorithm and its integration into diverse academic *** in 2020,the MRFO stands as a novel metaheuristic algorithm,drawing inspiration from ...
详细信息
This paper comprehensively analyzes the Manta Ray Foraging Optimization(MRFO)algorithm and its integration into diverse academic *** in 2020,the MRFO stands as a novel metaheuristic algorithm,drawing inspiration from manta rays’unique foraging behaviors—specifically cyclone,chain,and somersault *** biologically inspired strategies allow for effective solutions to intricate physical *** its potent exploitation and exploration capabilities,MRFO has emerged as a promising solution for complex optimization *** utility and benefits have found traction in numerous academic *** its inception in 2020,a plethora of MRFO-based research has been featured in esteemed international journals such as IEEE,Wiley,Elsevier,Springer,MDPI,Hindawi,and Taylor&Francis,as well as at international conference *** paper consolidates the available literature on MRFO applications,covering various adaptations like hybridized,improved,and other MRFO variants,alongside optimization *** trends indicate that 12%,31%,8%,and 49%of MRFO studies are distributed across these four categories respectively.
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of t...
详细信息
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of the product based on the time truncated life test employing theWeibull *** control chart developed supports the examination of the mean lifespan variation for a particular product in the process of *** control limit levels are used:the warning control limit,inner control limit,and outer control ***,they enhance the capability for variation detection.A genetic algorithm can be used for optimization during the in-control process,whereby the optimal parameters can be established for the proposed control *** control chart performance is assessed using the average run length,while the influence of the model parameters upon the control chart solution is assessed via sensitivity analysis based on an orthogonal experimental design withmultiple linear regression.A comparative study was conducted based on the out-of-control average run length,in which the developed control chart offered greater sensitivity in the detection of process shifts while making use of smaller samples on average than is the case for existing control ***,to exhibit the utility of the developed control chart,this paper presents its application using simulated data with parameters drawn from the real set of data.
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge...
详细信息
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
暂无评论