In the data based digital age, there are risks of attacks that cause denial of service (DoS) or distributed denial of service (DDoS) which pose threats to the security and availability of databases especially with tho...
详细信息
ISBN:
(数字)9798331533243
ISBN:
(纸本)9798331533250
In the data based digital age, there are risks of attacks that cause denial of service (DoS) or distributed denial of service (DDoS) which pose threats to the security and availability of databases especially with those who are affected by this which is very disturbing. This research aims at analysing the methods of detecting and preventing DoS and DDoS attacks, with more focus on the security of databases. This research identifies and evaluates various strategies employed to counter such threats to cloud and Internet of Things (IoT) systems from the literature review conducted using the PRISMA approach. The analyses show that machine learning algorithms are capable of enhancing the detection of DoS/DDoS attack's efficiency and accuracy, and the cloud and IoT security solutions, including complex load balancing and powerful firewalls, are crucial for preventing and mitigating such attacks. This study also shows that, AI should be included in the security plans and security measures should be adaptable and proactive. This work is useful for scholars, developers, and cybersecurity experts who are interested in enhancing measures to counter and prevent advanced cybercrimes and ensuring continued and reliable functionality in data centric settings.
A vehicle has a license plate and can be identified by the license number attached to the vehicle plate. For detection and recognition, multimedia sensors can be used so that it requires a vehicle tracking application...
详细信息
The impacts incurred by floods regularly affect the planets population, inflicting social and economic problems. Optimal control strategies based on reservoir management may aid in controlling floods and mitigating th...
详细信息
The impacts incurred by floods regularly affect the planets population, inflicting social and economic problems. Optimal control strategies based on reservoir management may aid in controlling floods and mitigating the resulting damage. To this end, an accurate dynamic representation of water systems is needed. In practice, flood control strategies rely on hydrological forecasting models obtained fromconceptual or data-drivenmethods. Encouraged by recent works, this research proposes a novel surrogate model for water flow in a river channel based on physics-informed neural networks (PINNs). This approach achieved promising results regarding the assimilation of real-data measurements and the parameter identification of differential equations that govern the underlying dynamics. This article investigates PINN performance in a simulated environment built directly from a configuration of the Saint-Venant equations. The objective is to create a suitable model with high prediction accuracy and scientifically consistent behavior for use in real-Time applications. The experiments revealed promising results for hydrological modeling and presented alternatives to solve the main challenges found in conventional methods while assisting in synthesizing real-world representations. Impact Statement-The research seeks to contribute to the hydrological modeling area with a surrogate model based on physicsinformed neural networks (PINNs) to water flow in a watershed. In practice, thesemodels use conceptual or *** models to reach the precision provided by themethodology use large numbers of physical parameters. These parameters can demand deep knowledge about the environment and are possibly hard to identify in a complex basin. On the other hand, while data-driven methods do not require such knowledge about the dynamic system, they depend on a reliable and useful database to guarantee the accuracy of system *** introduce PINNs as a viable solution for
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could e...
详细信息
High-precision cylindrical parts are critical components across various industries including aerospace, automotive, and manufacturing. Since these parts play a pivotal role in the performance and safety of the systems...
详细信息
Dropout is a particular concern for countries striving to increase human capital. Various attempts have been made by universities to minimize the number of dropouts. Machine learning has also developed various predict...
详细信息
作者:
Bakr, Hend A.Salama, Ahmed M.Fares, AhmedZaky, Ahmed B.Cairo University
Biomedical Engineering Program Faculty of Engineering Giza Egypt Benha University
Computer Systems Engineering Program Faculty of Engineering at Shoubra Banha Egypt
Computer science and information technology Programs Alexandria Egypt Benha University
On leave from Computer Systems Engineering Program Faculty of Engineering at Shoubra Egypt
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a...
详细信息
In this study, we use the CIMulator platform to evaluate the performance of neuromorphic accelerators with novel Hf0.5Zr0.5O2 (HZO) ferroelectric fin field-effect transistor (FefinFET) as synaptic device. The MNIST ha...
详细信息
This research is aimed to develop and evaluate an Electronic Human Resource Management (E-HRM) system called WorkEv to assist in monitoring and improving employee's performance. The application was developed based...
详细信息
Researchers emphasize the importance of hardware accelerators for mathematical morphology. If there are any issues, the hardware architecture may need to be redesigned. Thus, we propose a novel, reconfigurable hardwar...
详细信息
暂无评论