Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural net...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural network(1DCNN)architectures to enhance ransomware detection *** common challenges in ransomware detection,particularly dataset class imbalance,the synthetic minority oversampling technique(SMOTE)is employed to generate synthetic samples for minority class,thereby improving detection *** integration of ViT and 1DCNN through feature fusion enables the model to capture both global contextual and local sequential features,resulting in comprehensive ransomware *** on the UNSW-NB15 dataset,the proposed ViT-1DCNN model achieved 98%detection accuracy with precision,recall,and F1-score metrics surpassing conventional *** approach not only reduces false positives and negatives but also offers scalability and robustness for real-world cybersecurity *** results demonstrate the model’s potential as an effective tool for proactive ransomware detection,especially in environments where evolving threats require adaptable and high-accuracy solutions.
The formulations and approximations of the branch flow model for general(radial and mesh) power networks(General-BranchFlow) are given in this paper. Using different sets of the power flow equations, six formats of th...
详细信息
The formulations and approximations of the branch flow model for general(radial and mesh) power networks(General-BranchFlow) are given in this paper. Using different sets of the power flow equations, six formats of the exact General-BranchFlow model are listed. The six formats are mathematically equivalent with each other. Linear approximation and second-order cone programming(SOCP) are then used to derive the six formats of the convex General-BranchFlow model. The branch ampacity constraints considering the shunt conductance and capacitance of the transmission line Π-model are derived. The key foundation of deriving the ampacity constraints is the correct interpretation of the physical meaning of the transmission line Π-model. An exact linear expression of the ampacity constraints of the power loss variable is derived. The applications of the General-BranchFlow model in deriving twelve formats of the exact optimal power flow(OPF) model and twelve formats of the approximate OPF model are formulated and analyzed. Using the Julia programming language, the extensive numerical investigations of all formats of the OPF models show the accuracy and computational efficiency of the General-BranchFlow model. A penalty function based approximation gap reduction method is finally proposed and numerically validated to improve the AC-feasibility of the approximate General-BranchFlow model.
We study the problem of approximately transforming a sample from a source statistical model to a sample from a target statistical model without knowing the parameters of the source model, and construct several computa...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Sentiment analysis and emotion classification are two crucial components of natural language processing (NLP), which have been widely explored in recent years due to their broad applications. Sentiment analysis aims t...
详细信息
We consider a setting in which N agents aim to speedup a common Stochastic Approximation (SA) problem by acting in parallel and communicating with a central server. We assume that the up-link transmissions to the serv...
详细信息
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
To accommodate the wide range of input voltages supplied by redundant batteries and ensure an adequate hold-up time for communication systems during utility power failures, power supplies used in 5 G base stations typ...
详细信息
In this paper, we propose a multiple-input multiple-output (MIMO) configuration for chirp spread spectrum (CSS) modulation integrated with the permutation matrix modulation (PMM) scheme, namely, MIMO-CSS-PMM. The prop...
详细信息
Tip-enhanced Raman spectroscopy(TERS)imaging is a super-resolution imaging technique that features the merits of both surface-enhanced Raman spectroscopy(SERS)and scanning probe microscopy(SPM),such as the high chemic...
详细信息
Tip-enhanced Raman spectroscopy(TERS)imaging is a super-resolution imaging technique that features the merits of both surface-enhanced Raman spectroscopy(SERS)and scanning probe microscopy(SPM),such as the high chemical sensitivity from the former and the nanoscale spatial resolution from the *** advantages make TERS an essential nanospectroscopic characterization technique for chemical analysis,materials science,bio-sensing,*** probes,the most critical factor determining the TERS imaging quality,are expected to provide a highly confined electromagnetic hotspot with a minimized scattering background for the generation of Raman signals with high spatial *** two decades of development,numerous probe design concepts have been proposed and *** review provides a comprehensive overview of the state-of-the-art TERS probe designs,from the working mechanism to the practical *** start with reviewing the recent development of TERS configurations and the corresponding working mechanisms,including the SPM platforms,optical excitation/collection techniques,and probe preparation *** then review the emerging novel TERS probe designs,including the remote-excitation probes,the waveguide-based nanofocusing probes,the metal-coated nanofocusing probes,the nanowire-assisted selective-coupling probes,and the tapered metal-insulator-metal *** discussion focuses on a few critical aspects,including the surface-plasmon-polariton(SPP)hotspot excitation technique,conversion efficiency,working frequency,and *** the end,we review the latest TERS applications and give a perspective on the future of TERS.
暂无评论