The UAV-assisted wireless network is envisioned as a key player in the sixth generation (6G) wireless systems. One of the most challenging tasks to make it practically viable is to deploy UAVs considering user density...
详细信息
In batch production systems, detecting low-yield machines is essential for minimizing the production of defective pieces, which is a complex problem that currently requires multiple experts, considerable capital, or a...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in order to prolong network lifetime;owing to resource-constrained nature of *** fundamental requirement of any network is routing a packet from its source to *** of a routing algorithm depends on the number of network parameters utilized by that routing *** the recent years,various routing protocol has been developed for the delay tolerant networks(DTN).A routing protocol known as spray and wait(SnW)is one of the most widely used routing algorithms for *** this paper,we study the SnW routing protocol and propose a modified version of it referred to as Pentago SnW which is based on pentagonal number *** to binary SnW shows promising results through simulation using real-life scenarios of cars and pedestrians randomly moving on a map.
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec...
详细信息
Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection ...
详细信息
Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection of autism in *** can seek professional help for a better prognosis of the child’s therapy when ASD is diagnosed under five *** research study aims to develop an automated tool for diagnosing autism in *** computer-aided diagnosis tool for ASD detection is designed and developed by a novel methodology that includes data acquisition,feature selection,and classification *** most deterministic features are selected from the self-acquired dataset by novel feature selection methods before *** Imperialistic competitive algorithm(ICA)based on empires conquering colonies performs feature selection in this *** performance of Logistic Regression(LR),Decision tree,K-Nearest Neighbor(KNN),and Random Forest(RF)classifiers are experimentally studied in this research *** experimental results prove that the Logistic regression classifier exhibits the highest accuracy for the self-acquired *** ASD detection is evaluated experimentally with the Least Absolute Shrinkage and Selection Operator(LASSO)feature selection method and different *** Exploratory Data Analysis(EDA)phase has uncovered crucial facts about the data,like the correlation of the features in the dataset with the class variable.
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving sophistication of cyber *** paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack *** approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in *** demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant ***,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time *** for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current *** innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
Understanding the learner’s requirements and status is important for recommending relevant and appropriate learning materials to the learner in personalized learning. For this purpose, the learning recommendatio...
详细信息
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiag...
详细信息
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiagent sys-tems sensing and acting in an environment contribute to adaptive cyber *** present a learning strategy that enables multiple agents to learn optimal poli-cies using multiagent reinforcement learning(MARL).Our proposed approach is inspired by the multiarmed bandits(MAB)learning technique for multiple agents to cooperate in decision making or to work *** study a MAB approach in which defenders visit a system multiple times in an alternating fash-ion to maximize their rewards and protect their *** find that this game can be modeled from an individual player’s perspective as a restless MAB *** discover further results when the MAB takes the form of a pure birth process,such as a myopic optimal policy,as well as providing environments that offer the necessary incentives required for cooperation in multiplayer projects.
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine t...
详细信息
作者:
Manjunatha, A.S.Venkatramana Bhat, P.
Department of Computer and Communication Engineering India
Department of Computer Science and Engineering India
Data is collected and forwarded to the cluster head by sensor nodes in the Wireless Sensor Network (WSN). Ensuring the confidentiality and integrity of the data that must be provided to the base station is tough. We r...
详细信息
暂无评论