A concept and practical implementation of a crowd management system which acquires input data by the set of monitoring cameras is presented. Two leading threads are considered. First concerns the crowd behavior analys...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
Existing multithreaded network processors architecture with multiple processing engines (PEs), aims at taking advantage of blocked multithreading technique which executes instructions of different user-defined threads...
详细信息
This paper compares some m utationoperators containing expert knowledge about the problem of optimizing the parameters of a Radial Basis Function Neural Network. It is sho wn that the expert kno wledge is not abrays a...
详细信息
Developments in technology and computer aims to facilitate the human life. Every new technology developed by computer science is tried to integrate into systems. Rapidly developing satellite, navigation and geographic...
详细信息
The smart grid achieves bidirectional information and energy flow between energy consumer and utility grid, aiding energy users not only to utilize energy, but also to produce, sell, and share energy with other consum...
详细信息
Prediction of the secondary structure of a protein from its aminoacid sequence remains an important and difficult task. Up to this moment, three generations of Protein Secondary Structure Algorithms have been defined:...
详细信息
Taking the strain tensor, the scalar damage variable, and the damage gradient as the state variables of the Helmholtz free energy, the general expressions of the firstorder gradient damage constitutive equations are d...
详细信息
Taking the strain tensor, the scalar damage variable, and the damage gradient as the state variables of the Helmholtz free energy, the general expressions of the firstorder gradient damage constitutive equations are derived directly from the basic law of irreversible thermodynamics with the constitutive functional expansion method at the natural state. When the damage variable is equal to zero, the expressions can be simplified to the linear elastic constitutive equations. When the damage gradient vanishes, the expressions can be simplified to the classical damage constitutive equations based on the strain equivalence hypothesis. A one-dimensional problem is presented to indicate that the damage field changes from the non-periodic solutions to the spatial periodic-like solutions with stress increment. The peak value region develops a localization band. The onset mechanism of strain localization is proposed. Damage localization emerges after damage occurs for a short time. The width of the localization band is proportional to the internal characteristic length.
This paper presents a new algorithm for designing fuzzy systems. It automatically identifies the optimum number of rules in the fuzzy knowledge base and adjusts the parameters defining them. This algorithm hybridizes ...
详细信息
Server consolidation based on virtualization technology simplifies system administration and improves energy efficiency by improving resource utilizations and reducing the physical machine (PM) number in contemporary ...
详细信息
暂无评论