作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
The variety of crops, differences in climate, and the multiplicity of disease symptoms make early identification and evaluation of leaf diseases a challenging task. Although deep-learning methods have been created for...
详细信息
Mobile Ad hoc Network (MANET) is broadly applicable in various sectors within a short amount of time, which is connected to mobile developments. However, the communication in the MANET faces several issues like synchr...
详细信息
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In...
详细信息
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo...
详细信息
Vision sensors are versatile and can capture a wide range of visual cues, such as color, texture, shape, and depth. This versatility, along with the relatively inexpensive availability of machine vision cameras, playe...
详细信息
Vision sensors are versatile and can capture a wide range of visual cues, such as color, texture, shape, and depth. This versatility, along with the relatively inexpensive availability of machine vision cameras, played an important role in adopting vision-based environment perception systems in autonomous vehicles (AVs). However, vision-based perception systems can be easily affected by glare in the presence of a bright source of light, such as the sun or the headlights of the oncoming vehicle at night or simply by light reflecting off snow or ice-covered surfaces;scenarios encountered frequently during driving. In this paper, we investigate various glare reduction techniques, including the proposed saturated pixel-aware glare reduction technique for improved performance of the computer vision (CV) tasks employed by the perception layer of AVs. We evaluate these glare reduction methods based on various performance metrics of the CV algorithms used by the perception layer. Specifically, we considered object detection, object recognition, object tracking, depth estimation, and lane detection which are crucial for autonomous driving. The experimental findings validate the efficacy of the proposed glare reduction approach, showcasing enhanced performance across diverse perception tasks and remarkable resilience against varying levels of glare. IEEE
With advancements in technology, the study of data hiding (DH) in images has become more and more important. In this paper, we introduce a novel data hiding scheme that employs a voting strategy to predict pixels base...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s *** exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and *** the time of the attack,it appears the women were immobilized and needed immediate *** self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or *** proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud *** is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud *** can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location *** has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 *** average activation time is 2.079 s.
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN e...
详细信息
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN energy constraints is considered to be a key *** wireless sensor networks(WSNs),wireless mobile chargers(MCs)conquer such issues mainly,energy *** proposed work is to produce an energy-efficient recharge method for Wireless Rechargeable Sensor Network(WRSN),which results in a longer lifespan of the network by reducing charging delay and maintaining the residual energy of the *** this algorithm,each node gets sorted using the K-means technique,in which the data gets distributed into various *** mobile charges execute a Short Hamiltonian cycle opposite direction to reach each cluster’s anchor *** position of the anchor points is calculated based on the energy distribution using the base *** this case,the network will act as a spare MC,so that one of the two MCs will run out of energy before reaching the *** the current tours of the two MCs terminate,regression analysis for energy prediction initiates,enabling the updating of anchor points in the upcoming *** on thefindings of the regression-based energy prediction model,the recommended algorithm could effectively refill network energy.
Brain-Machine Interfaces (BMIs) offer significant promise for enabling paralyzed individuals to control external devices using their brain signals. One challenge is that during the online Brain Control (BC) process, s...
详细信息
暂无评论