For autonomous driving to operate in a safe and effective manner, efficient and precise object detection is essential. The efficacy of the network model is heavily challenged because of the high-speed movement of vehi...
详细信息
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services *** this system,Platform as a Service(PaaS)offers a medium headed for a web development plat...
详细信息
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services *** this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and *** using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these *** though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite *** this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation *** can easily differentiate common traffic and attack *** only that,it greatly helps the network to distribute the resources only for authenticated *** effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks.
This paper presents MACPGANA, a novel multimodal agriculture commodity price prediction model leveraging Generative Adversarial Networks (GAN) and Autoencoders (AEs). The model integrates multimodal data to extract an...
详细信息
Digital microfluidic biochip provides an alternative platform to synthesize the biochemical protocols. Droplet routing in biochemical synthesis involves moving multiple droplets across the biochip simultaneously. It i...
详细信息
The principal features of cloud computing are dynamic resource allocation and its pricing nature. This paper implies an algorithm that provides resources based on the demand to users in the cloud infrastructure as a s...
详细信息
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo...
详细信息
In recent years, there has been a rise in work which focuses on various issues of recommender systems other than accuracy. Popularity bias is one factor that causes the list of recommendations to deviate from the user...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion ...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion by filtering redundant features, thus alleviating the dimensional disaster problem and achieving efficient identification of malware families for proper classification. Malware authors use obfuscation technology to generate a large number of malware variants, which imposes a heavy analysis burden on security researchers and consumes a lot of resources in both time and space. To this end, we propose the MalFSM framework. Through the feature selection method, we reduce the 735 opcode features contained in the Kaggle dataset to 16, and then fuse on metadata features(count of file lines and file size)for a total of 18 features, and find that the machine learning classification is efficient and high accuracy. We analyzed the correlation between the opcode features of malicious samples and interpreted the selected features. Our comprehensive experiments show that the highest classification accuracy of MalFSM can reach up to 98.6% and the classification time is only 7.76 s on the Kaggle malware dataset of Microsoft.
Natural language processing (NLP) is an area of research and study that makes it possible for computers to comprehend human language by utilising software engineering concepts from computerscience and artificial inte...
详细信息
Simultaneous lightwave information and power transfer (SLIPT), co-existing with optical wireless communication,holds an enormous potential to provide continuous charging to remote Internet of Things (IoT) devices whil...
详细信息
Simultaneous lightwave information and power transfer (SLIPT), co-existing with optical wireless communication,holds an enormous potential to provide continuous charging to remote Internet of Things (IoT) devices while ensuringconnectivity. Combining SLIPT with an omnidirectional receiver, we can leverage a higher power budget whilemaintaining a stable connection, a major challenge for optical wireless communication systems. Here, we design amultiplexed SLIPT-based system comprising an array of photodetectors (PDs) arranged in a 3 × 3 configuration. Thesystem enables decoding information from multiple light beams while simultaneously harvesting energy. The PDs canswiftly switch between photoconductive and photovoltaic modes to maximize information transfer rates and provideon-demand energy harvesting. Additionally, we investigated the ability to decode information and harvest energywith a particular quadrant set of PDs from the array, allowing beam tracking and spatial diversity. The design wasexplored in a smaller version for higher data rates and a bigger one for higher power harvesting. We report a selfpoweringdevice that can achieve a gross data rate of 25.7 Mbps from a single-input single-output (SISO) and an 85.2Mbps net data rate in a multiple-input multiple-output (MIMO) configuration. Under a standard AMT1.5 illumination,the device can harvest up to 87.33 mW, around twice the power needed to maintain the entire system. Our workpaves the way for deploying autonomous IoT devices in harsh environments and their potential use in spaceapplications.
暂无评论