In agricultural water research, the adoption of Internet of Things (IoT) technology has emerged as a pivotal approach for large-scale data collection. Water availability in the context of water quality is very importa...
详细信息
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s ...
详细信息
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s stop points,is a necessity to minimize the energy consumption of the UAV and the NB-IoT devices and also to conduct the data collection *** this regard,this paper proposes GainingSharing Knowledge(GSK)algorithm for optimizing the UAV’s *** GSK,the number of UAV’s stop points in the three-dimensional space is encapsulated into a single individual with a fixed length representing an entire *** superiority of using GSK in the tackled problem is verified by simulation in seven *** provides significant results in all seven scenarios compared with other four optimization algorithms used before with the same ***,the NB-IoT is proposed as the wireless communication technology between the UAV and IoT devices.
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control ce...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control centralization,and introducing network ***,the controller is similarly vulnerable to a“single point of failure”,an attacker can execute a distributed denial of service(DDoS)attack that invalidates the controller and compromises the network security in *** address the problem of DDoS traffic detection in SDN,a novel detection approach based on information entropy and deep neural network(DNN)is *** approach contains a DNN-based DDoS traffic detection module and an information-based entropy initial inspection *** initial inspection module detects the suspicious network traffic by computing the information entropy value of the data packet’s source and destination Internet Protocol(IP)addresses,and then identifies it using the DDoS detection module based on *** assaults were found when suspected irregular traffic was *** reveal that the algorithm recognizes DDoS activity at a rate of more than 99%,with a much better accuracy *** false alarm rate(FAR)is much lower than that of the information entropy-based detection ***,the proposed framework can shorten the detection time and improve the resource utilization efficiency.
Machine translation focuses mainly on high-resource languages (HRLs), while low-resource languages (LRLs) like Taiwanese Hokkien are relatively under-explored. The study aims to address this gap by developing a dual t...
详细信息
This study proposed a novel extraction method of c-Fos protein regions in DAB(3,3'-diaminobenzidine)-stained mouse brain slice images using the U-Net model combined with the multi-channelization and 1×1 convo...
详细信息
The task of image anomaly detection (IAD) aims to identify deviations from normality in image data. These anomalies are patterns that deviate significantly from what the IAD model has learned from the data during trai...
详细信息
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,...
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today, techniques that can automatically detect malware before it infects the system is required. This study aims to develop malware detection using machine learning approach with Principal Component Analysis (PCA) as feature reduction. PCA (Principal Component Analysis) is expected to be able to reduce the number of features which then could also reduce the learning time but do not reduce its accuracy significantly. There were four machine learning classifiers used in this study, i.e. K-Nearest Neighbor, Decision Tree, Naïve bayes, and Random Forest. The n-components used in this study were 20 and 34 and the ratio of test and train in the dataset was 35% for test and 65% for training. The results have shown that the best performance come from the detection using random forest with 34 n-component and 100 n-estimator with the average accuracy was 0.991688.
Typical video compression systems consist of two main modules: motion coding and residual coding. This general architecture is adopted by classical coding schemes (such as international standards H.265 and H.266) and ...
详细信息
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of ne...
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of new attack types, it’s practically infeasible to persistently update attack patterns or signatures within security parameters. Key tools such as Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) are instrumental in monitoring network traffic and identifying potential threats. However, these tools face limitations, such as the high volume of alerts produced by IDS and the use of rule-based method, also the inability of SIEM tools to analyze logs comprehensively to identify inappropriate activities. This research has conducted anomaly detection using machine learning process to classify cyber-attacks network flow collected from IDS that installed incident network infrastructure. The analysis of IDS using machine learning, integrated with SIEM. The algorithm used in this research was Random Forest Classifier using CSE-CID-IDS2018 dataset pre-processed with Principal Component Analysis (PCA). Results of the experiments show that Random Forest Classifier Model, when combined with Principal Component Analysis (PCA), yields the most commendable results when applied to a 70/30 training/testing data ratio with accuracy of 0.99953.
Species interaction networks are a powerful tool for describing ecological communities;they typically contain nodes representing species, and edges representing interactions between those species. For the purposes of ...
详细信息
暂无评论