Disastrous situations pose a formidable challenge, testing our resilience against nature's fury and the race against time to prevent the loss of human life. It is noted that in such situations that Microblogging p...
详细信息
Ethiopia, known as the birthplace of coffee, relies on coffee exports as a major source of foreign currency. This research paper focuses on developing a hybrid feature mining technique to automatically classify Ethiop...
详细信息
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprec...
详细信息
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprecedented capabilities that can revolutionize how healthcare services are delivered and experienced. This paper explores the potential of QIoT in the context of smart healthcare, where interconnected quantum-enabled devices and systems create an ecosystem that enhances data security, enables real-time monitoring, and advances medical knowledge. We delve into the applications of quantum sensors in precise health monitoring, the role of quantum communication in secure telemedicine, and the computational power of quantum computing in drug discovery and personalized medicine. We discuss challenges such as technical feasibility, scalability, and regulatory considerations, along with the emerging trends and opportunities in this transformative field. By examining the intersection of quantum technologies and smart healthcare, this paper aims to shed light on the novel approaches and breakthroughs that could redefine the future of healthcare delivery and patient outcomes. IEEE
Time series data is data that is collected periodically and has certain time intervals. Time series data is widely available in the fields of finance, meteorology, signal processing, health, and economics. Weather dat...
详细信息
With the increasing traffic congestion problems in metropolises, traffic prediction plays an essential role in intelligent traffic systems. Notably, various deep learning models, especially graph neural networks (GNNs...
详细信息
Subspace clustering has shown great potential in discovering the hidden low-dimensional subspace structures in high-dimensional data. However, most existing methods still face the problem of noise distortion and overl...
详细信息
Automated detection of plant diseases is crucial as it simplifies the task of monitoring large farms and identifies diseases at their early stages to mitigate further plant degradation. Besides the decline in plant he...
详细信息
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi...
详细信息
Software Defined Networks (SDN) face many security challenges today. A great deal of research has been done within the field of Intrusion Detection Systems (IDS) in these networks. Yet, numerous approaches still rely ...
详细信息
Software Defined Networks (SDN) face many security challenges today. A great deal of research has been done within the field of Intrusion Detection Systems (IDS) in these networks. Yet, numerous approaches still rely on deep learning algorithms, but these algorithms suffer from complexity in implementation, the need for high processing power, and high memory consumption. In addition to security issues, firstly, the number of datasets that are based on SDN protocols are very small. Secondly, the ones that are available encompass a variety of attacks in the network and do not focus on a single attack. For this reason, to introduce an SDN-based IDS with a focus on Distributed Denial of Service (DDoS) attacks, it is necessary to generate a DDoS-oriented dataset whose features can train a high-quality IDS. In this work, in order to address two important challenges in SDNs, in the first step, we generate three DDoS attack datasets based on three common and different network topologies. Then, in the second step, using the Convolutional Tsetlin Machine (CTM) algorithm, we introduce a lightweight IDS for DDoS attack dubbed "CTMBIDS," with which we implement an anomaly-based IDS. The lightweight nature of the CTMBIDS stems from its low memory consumption and also its interpretability compared to the existing complex deep learning models. The low usage of system resources for the CTMBIDS makes it an ideal choice for an optimal software that consumes the SDN controller’s least amount of memory. Also, in order to ascertain the quality of the generated datasets, we compare the empirical results of our work with the DDoS attacks of the KDDCup99 benchmark dataset as well. Since the main focus of this work is on a lightweight IDS, the results of this work show that the CTMBIDS performs much more efficiently than traditional and deep learning based machine learning algorithms. Furthermore, the results also show that in most datasets, the proposed method has relatively equal or better
Smart contracts are the building blocks of blockchain systems that enable automated peer-to-peer transactions and decentralized *** contracts certainly provide a powerful functional surplus for maintaining the consist...
详细信息
Smart contracts are the building blocks of blockchain systems that enable automated peer-to-peer transactions and decentralized *** contracts certainly provide a powerful functional surplus for maintaining the consistency of transactions in applications governed by blockchain *** contracts have become lucrative and profitable targets for attackers because they can hold a large amount of *** verification and symbolic analysis have been employed to combat these destructive scams by analysing the codes and function calls,yet each scam's vulnerability should be discreetly *** this work,we introduce ADEFGuard,a new anomaly detection framework based on the behaviour of smart contracts,as a new *** design a learning and monitoring module to determine fraudulent smart contract *** framework is advantageous over basic algorithms in three ***,ADEFGuard provides a unified solution to different genres of scams,relieving the need for code analysis ***,ADEFGuard's inference is orders of magnitude faster than code ***,the experimental results show that ADEFGuard achieves high accuracy(85%),precision(75%),and recall(90%)for malicious contracts and is potentially useful in detecting new malicious behaviours of smart contracts.
暂无评论