The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electro...
详细信息
The heart is indispensable for body. Diagnosis of heart disease must be complete and accurate. Heart disease is a dangerous disease. This disease is caused by many problems such as excessive stress, diabetes, high blo...
详细信息
In an infrastructure cloud environment, task scheduling should focus on optimizing execution time and saving energy. The data center consumes a large amount of energy during the execution of the task. Energy-saving te...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
By presenting an improved Intrusion Detection System (IDS) that combines deep learning with support vector machines (SVM), this research increases network security. The main goal is to increase the accuracy of SVM det...
详细信息
People’s demand for vehicles has been increasing day by day over the last few decades. A survey tells us that over 50,000 vehicles run on the roads per day. Such a large number of vehicles causes traffic. A survey te...
详细信息
Better patient outcomes and prompt care depend on early detection of heart attacks. In this current work, we use the infamous MIT-BIH Arrhythmia Dataset, a reference resource for cardiac abnormality recognition, to tr...
详细信息
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env...
详细信息
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh environment leads to significant variations in the shape and size of the defects. To address this challenge, we propose the multivariate time series segmentation network(MSSN), which adopts a multiscale convolutional network with multi-stage and depth-separable convolutions for efficient feature extraction through variable-length templates. To tackle the classification difficulty caused by structural signal variance, MSSN employs logarithmic normalization to adjust instance distributions. Furthermore, it integrates classification with smoothing loss functions to accurately identify defect segments amid similar structural and defect signal subsequences. Our algorithm evaluated on both the Mackey-Glass dataset and industrial dataset achieves over 95% localization and demonstrates the capture capability on the synthetic dataset. In a nuclear plant's heat transfer tube dataset, it captures 90% of defect instances with75% middle localization F1 score.
Due to the high incidence and possibly fatal nature of skin cancer, early identification is crucial for enhancing patient results. This paper presents a unique deep learning network, EfficientNetB0 ViT, to accurately ...
详细信息
暂无评论