This paper investigates the application of classification models within the telecommunications industry, focusing on K-Nearest Neighbors (KNN), Random Forest (RF), and Naive Bayes (NB). Various machine learning models...
详细信息
ISBN:
(数字)9798331523657
ISBN:
(纸本)9798331523664
This paper investigates the application of classification models within the telecommunications industry, focusing on K-Nearest Neighbors (KNN), Random Forest (RF), and Naive Bayes (NB). Various machine learning models were applied to a dataset comprising 290,000 customer records to predict customer churn. While RF and NB models exhibited high performance, achieving precision and recall scores exceeding 99%, they also demonstrated significant overfitting. To address this, Learning curves, correlation heatmaps, and advanced feature normalization techniques, including quantile transformation, improved model generalization. The results revealed a notable reduction in overfitting, with cross-validation accuracy for KNN and NB improving by over 5%. Furthermore, hyperparameter tuning of the RF model reduced the gap between training and validation performance, achieving near-parity in scores. These findings contribute to the development of robust and reliable predictive models for machine learning applications, offering actionable insights for improving customer retention strategies in the telecommunications industry.
Mobile Edge Networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH...
详细信息
Mobile Edge Networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH) protocol to establish secret keys that provide end-to-end encryption among their nodes. X3DH relies on a cloud server that stores the public keys of the nodes to address the asynchronous scenarios when they operate offline. The cloud server in X3DH protocol represents a single point of failure (SPoF), as the exchange of secure keys is disrupted if the server fails or is compromised. Moreover, a malicious attacker, Eve, can launch various DoS attacks against the MEN nodes (e.g., packet dropping or packet modification) and wireless links (e.g., jamming) to disrupt the execution of X3DH during secure key exchange. This paper proposes the DoS-Resistant-X3DH (DR3DH) protocol to resolve the SPoF of the cloud server in X3DH and to address packet dropping, packet modification, and jamming DoS attacks. DR3DH employs Reed–Solomon Erasure Coding to encode the X3DH public keys into fragments that are distributed into a set of storage nodes. These storage nodes, which are determined by an Integer Linear Programming (ILP) solver, are optimum. That is, they have lowest probabilities to launch packet dropping/modification attacks and lowest probabilities that the wireless links toward them are jammed. The authors evaluated DR3DH through trace-driven simulations in MATLAB using two mobility traces and a proof-of-concept implementation in Java. The authors also compared DR3DH with two approaches that employ Random and Greedy policies when selecting the storage nodes for keys fragments. The results demonstrate the resistance of DR3DH to DoS attacks, achieving a high success rate that outperforms the Random and Greedy approaches by between 13.6% and 83.0%. Additionally, the results confirm the feasibility of DR3DH under different mobility models and node speeds, as demonstrated by
Current quantum generative adversarial networks (QGANs) still struggle with practical-sized data. First, many QGANs use principal component analysis (PCA) for dimension reduction, which, as our studies reveal, can dim...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Current quantum generative adversarial networks (QGANs) still struggle with practical-sized data. First, many QGANs use principal component analysis (PCA) for dimension reduction, which, as our studies reveal, can diminish the QGAN’s effectiveness. Second, methods that segment inputs into smaller patches processed by multiple generators face scalability issues. In this work, we propose LSTM-QGAN, a QGAN architecture that eliminates PCA preprocessing and integrates quantum long short-term memory (QLSTM) to ensure scalable performance. Our experiments show that LSTM-QGAN significantly enhances both performance and scalability over state-of-the-art QGAN models, with visual data improvements, reduced Fréchet Inception Distance scores, and reductions of 5× in qubit counts, 5× in single-qubit gates, and 12× in two-qubit gates.
The fashion industry is undergoing a significant transformation, driven by advancements in digitalization and artificial intelligence (AI). This paper explores the integration of Stable Diffusion Models (SDMs) an...
详细信息
Brain dynamics big data is of increasing promise for many applications like epilepsy detection and cognitive understanding, with the advancements of consumer technology. However, the deep-source brain measurement is d...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Brain dynamics big data is of increasing promise for many applications like epilepsy detection and cognitive understanding, with the advancements of consumer technology. However, the deep-source brain measurement is difficult. In this study, we target the brain electroencephalogram (EEG) application, and investigate the deep-source EEG generation from surface EEG towards convenient big data. The deep learning algorithm has been developed to mine different configurations of the surface EEG streams, including the single-channel and multi-channel cases, for deep-source EEG generation. Promising experiments on the epilepsy application have been conducted, demonstrating the great promise of deep-learning-empowered deep-source EEG generation. This study will greatly advance brain dynamics mining towards smart consumer technology.
Hybrid metaheuristics can effectively tackle multi-objective optimization problems. Recently, researchers gained interest in procedures, referred to as architectures, that can provide generic functionalities and featu...
详细信息
Because of environmental concerns, remanufacturing has become an integral process for many production companies. Most published papers dealing with manufacturing and remanufacturing systems (MRSs) overlook some indust...
详细信息
Federated Learning (FL) offers a privacy-preserving solution by enabling multiple clients to train a shared model collaboratively without centralizing data. However, the decentralized nature of FL presents challenges,...
详细信息
This research demonstrated the machine learning (ML) classifiers with regression learning to improve an optical system’s quality of transmission (QoT). In Optical Communication, the data can be communicated from sour...
详细信息
Imagining and creating a future with a robot tailored to an individual’s needs and wants provides a unique challenge to both designers and perspective users. Using both an existing base zoomorphic robot, TherabotTM i...
详细信息
暂无评论