With the use of cognitive radio (CR) technology, wireless devices can utilize licensed spectrum when it is unused by the licensed users. CR was developed as a response to the wireless spectrum shortage issue caused by...
详细信息
With rising wind power penetration into power systems obtaining wind speed forecasts with associated uncertainty becomes crucial for better planning and dispatch. This study proposes an enhanced multi quantile regress...
详细信息
Hyper-relational facts, which consist of a primary triple (head entity, relation, tail entity) and auxiliary attribute-value pairs, are widely present in real-world Knowledge Graphs (KGs). Link Prediction on Hyper-rel...
详细信息
Precision medicine is based on curing diseases based on a patient's genetic profile, lifestyle, and environmental factors. This method improves clinical trial success rates and speed up drug regulatory approval. P...
详细信息
Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries in digital platforms to facilitate their ***,IIoT is being used in various industrial fields such as logistics,manufacturing,metals and mining,gas and oil,transportation,aviation,and energy *** is mandatory that various industrial fields require highly reliable security and preventive measures against *** detection is defined as the detection in the network of security threats targeting privacy information and sensitive *** Detection Systems(IDS)have taken an important role in providing security in the field of computer *** of intrusion is completely based on the detection functions of the *** an IIoT network expands,it generates a huge volume of data that needs an IDS to detect intrusions and prevent network *** research works have been done for preventing network *** day,the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly *** this regard,this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA(WDLDA).The implemented WDLDA results in a rate of detection accuracy(DRA)of 97%and a false positive rate(FPR)of 11%using the Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD)dataset.
Parallelizing of container terminal seaside layout optimizer using a Slurm cluster is considered in this paper. Maritime container terminals have quays divided into discrete berth segments. The number of berths and th...
详细信息
This study employs transfer learning using a fine-tuned pretrained EfficientNetB0 convolutional neural network (CNN) model to accurately detect the various stages of Diabetic Retinopathy. The training process involved...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the *** recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the *** paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its ***,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers.
Machine learning has become important for anomaly detection in water quality prediction. Data anomalies are often caused by the difficulties of analysing large amounts of data, both technical and human, but approaches...
详细信息
暂无评论