Purpose - This study aims to identify, analyze, and synthesize gamification's purposes, benefits, and essential factors in the tourism industry through a systematic literature review (SLR). Methodology - The resea...
详细信息
Online discussion forums are widely used for active textual interaction between lecturers and students, and to see how the students have progressed in a learning process. The objective of this study is to compare appr...
详细信息
Anaerobic fermentation for hydrogen production is influenced by various environmental factors that can limit microbial activity. However, machine learning (ML) shows significant potential in explaining the complexity ...
详细信息
In recent years, due to the proliferation of information and communication technology, as well as AI technology, industrial control systems, which were once in a closed network environment, have also integrated relate...
详细信息
Fuzzy logic can be used to represent obscurity based on terms such as high, old, hot, cold, and so on. Fuzzy logic can extend the range of truth values to all real numbers in intervals between 0 and 1. Numbers in this...
详细信息
We consider the use of a domain proxy assisted private citizen broadband radio service (CBRS) network and propose a Maximum Transmission Continuity (MTC) scheme to transmit Internet of Things (IoT) data reliably. MTC ...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control ce...
详细信息
Software-defined networking(SDN)is a new paradigm that promises to change by breaking vertical integration,decoupling network control logic from the underlying routers and switches,promoting(logical)network control centralization,and introducing network ***,the controller is similarly vulnerable to a“single point of failure”,an attacker can execute a distributed denial of service(DDoS)attack that invalidates the controller and compromises the network security in *** address the problem of DDoS traffic detection in SDN,a novel detection approach based on information entropy and deep neural network(DNN)is *** approach contains a DNN-based DDoS traffic detection module and an information-based entropy initial inspection *** initial inspection module detects the suspicious network traffic by computing the information entropy value of the data packet’s source and destination Internet Protocol(IP)addresses,and then identifies it using the DDoS detection module based on *** assaults were found when suspected irregular traffic was *** reveal that the algorithm recognizes DDoS activity at a rate of more than 99%,with a much better accuracy *** false alarm rate(FAR)is much lower than that of the information entropy-based detection ***,the proposed framework can shorten the detection time and improve the resource utilization efficiency.
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s ...
详细信息
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s stop points,is a necessity to minimize the energy consumption of the UAV and the NB-IoT devices and also to conduct the data collection *** this regard,this paper proposes GainingSharing Knowledge(GSK)algorithm for optimizing the UAV’s *** GSK,the number of UAV’s stop points in the three-dimensional space is encapsulated into a single individual with a fixed length representing an entire *** superiority of using GSK in the tackled problem is verified by simulation in seven *** provides significant results in all seven scenarios compared with other four optimization algorithms used before with the same ***,the NB-IoT is proposed as the wireless communication technology between the UAV and IoT devices.
In agricultural water research, the adoption of Internet of Things (IoT) technology has emerged as a pivotal approach for large-scale data collection. Water availability in the context of water quality is very importa...
详细信息
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,...
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today, techniques that can automatically detect malware before it infects the system is required. This study aims to develop malware detection using machine learning approach with Principal Component Analysis (PCA) as feature reduction. PCA (Principal Component Analysis) is expected to be able to reduce the number of features which then could also reduce the learning time but do not reduce its accuracy significantly. There were four machine learning classifiers used in this study, i.e. K-Nearest Neighbor, Decision Tree, Naïve bayes, and Random Forest. The n-components used in this study were 20 and 34 and the ratio of test and train in the dataset was 35% for test and 65% for training. The results have shown that the best performance come from the detection using random forest with 34 n-component and 100 n-estimator with the average accuracy was 0.991688.
暂无评论