The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware *** an innovative fea...
详细信息
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware *** an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique(IFDRT),the authors have significantly reduced the feature space while retaining critical information necessary for malware *** technique optimizes the model’s performance and reduces computational *** proposed method is demonstrated by applying it to the BODMAS malware dataset,which contains 57,293 malware samples and 77,142 benign samples,each with a 2381-feature *** the IFDRT method,the dataset is transformed,reducing the number of features while maintaining essential data for accurate *** evaluation results show outstanding performance,with an F1 score of 0.984 and a high accuracy of 98.5%using only two reduced *** demonstrates the method’s ability to classify malware samples accurately while minimizing processing *** method allows for improving computational efficiency by reducing the feature space,which decreases the memory and time requirements for training and *** new method’s effectiveness is confirmed by the calculations,which indicate significant improvements in malware classification accuracy and *** research results enhance existing malware detection techniques and can be applied in various cybersecurity applications,including real-timemalware detection on resource-constrained *** and scientific contribution lie in the development of the IFDRT method,which provides a robust and efficient solution for feature reduction in ML-based malware classification,paving the way for more effective and scalable cybersecurity measures.
Hypertension is a noncommunicable disease (NCD) that causes global concern, high costs and a high number of deaths. Internet of Things, Ubiquitous Computing, and Cloud Computing enable the development of systems for r...
详细信息
A location's Take-up Rate was significantly influenced by its Internet connectivity and availability. The purpose of this research is to answer concerns about internal Internet Service Provider issues that affect ...
详细信息
ISBN:
(数字)9798350327472
ISBN:
(纸本)9798350327489
A location's Take-up Rate was significantly influenced by its Internet connectivity and availability. The purpose of this research is to answer concerns about internal Internet Service Provider issues that affect Internet connectivity in clusters of West Java, Indonesia. It also aims to evaluate the results of models that forecast how these internal factors will affect internet connectivity. According to the research findings, the FTTH Cluster has eight significant Internet predictor connectivity out of 18 elements. Activation delay and Administration Documentation of Activation with Connectivity were the two major parameters modeled out of the 18 components. Artificial Neural Network (ANN), Support Vector Machine (SVM), and Decision Tree (DT) models were used to predict Internet Broadband Connectivity Classification based on the two most important variables. According to the study, ANN is the best model, with 99% accuracy and 99.6% precision when compared to SVM and DT. Furthermore, it exceeds previous studies that used the ANN model and achieved 97.92% accuracy.
作者:
Vamsi, T.M.N.Kalyan Chakravarthi, G.Lanka, PratibhaDivakar, B.
Dept of Computer Science and Engineering Engineering and Technology Program Visakhapatnam AP India
Depts of Computer Science Visakhapatnam AP India
Department of Computer Applications Visakhapatnam AP India
Today globally people designed different systems based on Internet of Things (IoT) principles and made human with smart living. In this article, an important application is proposed for our daily usage and is named as...
详细信息
This paper introduces a novel hybrid genetic algorithm combined with data mining to solve a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome re...
详细信息
ISBN:
(数字)9798350308365
ISBN:
(纸本)9798350308372
This paper introduces a novel hybrid genetic algorithm combined with data mining to solve a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome representation of the problem is based on random keys and we use the Biased Random-Key Genetic Algorithm (BRKGA) to establish an order in which jobs are scheduled. A data mining component gathers data from the evolutionary steps of BRKGA and suggests chromosomes based on past observations. In this way, we address a key challenge in BRKGA - the exploration of solutions near an individual gene - by leveraging data-driven insights to refine and enhance the search space. Comparative analysis reveals that our hybrid algorithm significantly benefits from the pattern recognition capabilities of data mining, leading to improved scheduled efficiency. The results of a series of computational experiments underscore the potential of this hybrid approach that, although requiring slightly longer computational times, is better than the previous baseline BRKGA algorithm in terms of solution quality.
Despite the widespread use of the Persian language by millions globally, limited efforts have been made in natural language processing for this language. The use of large language models as effective tools in various ...
详细信息
In this paper, we propose a switching scheme of GCR Block Ack and GCR Unsolicited Retry, standardized in IEEE 802.11aa, according to network conditions for video and audio groupcast over wireless LANs. We utilize thre...
In this paper, we propose a switching scheme of GCR Block Ack and GCR Unsolicited Retry, standardized in IEEE 802.11aa, according to network conditions for video and audio groupcast over wireless LANs. We utilize three transmission modes in the proposed method: GCR Block Ack with four retries, GCR Block Ack with two retries, and GCR Unsolicited Retry with twice transmission. The proposed method is compared with the three individual methods by computer simulation under various network conditions to evaluate application-level QoS. We then assess QoE by a subjective experiment. We show that the proposed method can choose an appropriate mode and achieve better QoE than the individual methods.
To protect privacy, Park et al. proposed a blockchain-enabled privacy-preserving scheme (BPPS) to achieve demand response in the smart grid environment. Park et al. claimed that their scheme could resist various attac...
详细信息
ISBN:
(数字)9798350394924
ISBN:
(纸本)9798350394931
To protect privacy, Park et al. proposed a blockchain-enabled privacy-preserving scheme (BPPS) to achieve demand response in the smart grid environment. Park et al. claimed that their scheme could resist various attacks and ensure both of privacy and data integrity. However, with thorough analysis of their scheme, we find that it suffers from three flaws.
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the M...
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the MVV-A system with MPEG-DASH. We conduct a subjective experiment changing available network bandwidth and investigate the effect of the methods on QoE.
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with...
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with a pair of audiovisual transmission and reception terminals and a pair of interference traffic transmission and reception ones. We investigate the effect of the transmission rate of interference traffic and communication distance in a wireless channel on the output quality of the video and audio stream at the reception terminal. We perform a subjective experiment with the output timing of video and audio obtained by the simulation.
暂无评论