The presence of long-range interactions is crucial in distinguishing between abstract complex networks and wave *** photonics,because electromagnetic interactions between optical elements generally decay rapidly with ...
详细信息
The presence of long-range interactions is crucial in distinguishing between abstract complex networks and wave *** photonics,because electromagnetic interactions between optical elements generally decay rapidly with spatial distance,most wave phenomena are modeled with neighboring interactions,which account for only a small part of conceptually possible ***,we explore the impact of substantial long-range interactions in topological *** demonstrate that a crystalline structure,characterized by long-range interactions in the absence of neighboring ones,can be interpreted as an overlapped *** overlap model facilitates the realization of higher values of topological invariants while maintaining bandgap width in photonic topological *** breaking of topology-bandgap tradeoff enables topologically protected multichannel signal processing with broad *** practically accessible system parameters,the result paves the way to the extension of topological physics to network science.
The crazy, unconscious use of the Internet, and the increase in cybercrime and hacking, which resulted in the loss of a large number of sensitive data, the risk of piracy, etc. were the motivation for protecting right...
详细信息
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins...
详细信息
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED *** most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.
The microphysical structure of rain has a significant impact on the quality of radio signal transmission in the upcoming deployment of 5G millimetre-wave wireless communications in South Africa. To address this, mitig...
详细信息
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** i...
详细信息
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** is,the fact that the profits obtained by infra-marginal technologies(technologies whose production cost is below the marginal price)allow them just to recover their investment *** the other hand,if the perfect competition assumption is removed,investment over-recovery or under-recovery generally occurs for infra-marginal technologies.
The increasing prevalence of drones has raised significant concerns regarding their potential for misuse in activities such as smuggling, terrorism, and unauthorized access to restricted airspace. Consequently, the de...
详细信息
We consider a power system whose electric demand pertaining to freshwater production is high(high freshwater electric demand),as in the Middle East,and investigate the tradeoff of storing freshwater in tanks versus st...
详细信息
We consider a power system whose electric demand pertaining to freshwater production is high(high freshwater electric demand),as in the Middle East,and investigate the tradeoff of storing freshwater in tanks versus storing electricity in batteries at the day-ahead operation *** storing freshwater and storing electricity increase the actual electric demand at valley hours and decrease it at peak hours,which is generally beneficial in term of cost and ***,to what extent?We analyze this question considering three power systems with different generation-mix configurations,i.e.,a thermal-dominated mix,a renewable-dominated one,and a fully renewable *** generation-mix configurations are inspired by how power systems may evolve in different countries in the Middle *** production uncertainty is compactly modeled using chance *** draw conclusions on how both storage facilities(freshwater and electricity)complement each other to render an optimal operation of the power system.
作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
With the widespread use of social networks, detecting the topics discussed on these platforms has become a significant challenge. Current approaches primarily rely on frequent pattern mining or semantic relations, oft...
详细信息
Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate...
详细信息
Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate *** this paper,we propose a VQA system intended to answer yes/no questions about real-world images,in *** support a robust VQA system,we work in two directions:(1)Using deep neural networks to semantically represent the given image and question in a fine-grainedmanner,namely ResNet-152 and Gated Recurrent Units(GRU).(2)Studying the role of the utilizedmultimodal bilinear pooling fusion technique in the *** the model complexity and the overall model *** fusion techniques could significantly increase the model complexity,which seriously limits their applicability for VQA *** far,there is no evidence of how efficient these multimodal bilinear pooling fusion techniques are for VQA systems dedicated to yes/no ***,a comparative analysis is conducted between eight bilinear pooling fusion techniques,in terms of their ability to reduce themodel complexity and improve themodel performance in this case of VQA *** indicate that these multimodal bilinear pooling fusion techniques have improved the VQA model’s performance,until reaching the best performance of 89.25%.Further,experiments have proven that the number of answers in the developed VQA system is a critical factor that *** the effectiveness of these multimodal bilinear pooling techniques in achieving their main objective of reducing the model *** Multimodal Local Perception Bilinear Pooling(MLPB)technique has shown the best balance between the model complexity and its performance,for VQA systems designed to answer yes/no questions.
暂无评论