Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health ...
详细信息
Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health of the ***,researchers often focus on identifying the illegal beha-viors in the SNS to reduce its negative infl*** state-of-art Natural Language processing techniques for anomaly detection have utilized a wide anno-tated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum *** overcome these issues,the proposed methodology utilizes a Modified Convolutional Neural Network(MCNN)using stochastic pooling and a Leaky Rectified Linear Unit(LReLU).Here,each word in the social media text is analyzed based on its *** stochastic pooling accurately detects the anomalous social media posts and reduces the chance of overfi*** LReLU overcomes the high computational cost and gradient vanishing problem associated with other activation *** also doesn’t stop the learning process when the values are *** MCNN computes a specified score value using a novel integrated anomaly detection *** on the score value,the anomalies are identified.A Teaching Learn-ing based Optimization(TLBO)algorithm has been used to optimize the feature extraction phase of the modified CNN and fast convergence is *** this way,the performance of the model is enhanced in terms of classification *** efficiency of the proposed technique is compared with the state-of-art techni-ques in terms of accuracy,sensitivity,specificity,recall,and *** proposed MCNN-TLBO technique has provided an overall architecture of 97.85%,95.45%,and 97.55%for the three social media datasets namely Facebook,Twitter,and Reddit respectively.
The evaluation of generative models in Machine Reading Comprehension (MRC) presents distinct difficulties, as traditional metrics like BLEU, ROUGE, METEOR, Exact Match, and F1 score often struggle to capture the nuanc...
The Human Mobility Signature Identification (HuMID) problem stands as a fundamental task within the realm of driving style representation, dedicated to discerning latent driving behaviors and preferences from diverse ...
详细信息
The global impact of ransomware on cybersecurity has increased alarmingly in recent years. It is the cause of important financial damage for individuals as well as for corporations. From the early days of computers, t...
详细信息
In this resarch work, a real-time hand gesture detection system for Ame rican Sign Language (ASL) that enables the deaf-dumb co mmun ity to interact with others by translating sign language into text. The current meth...
详细信息
Sleep is referred as a cyclic process which is the most important part in human life. The sleep disorder and its stages are observed from time waveforms such as Electroencephalogram (EEG), Electrocardiograms (ECG), an...
详细信息
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational data, systems, computers, and networks from unauthorized access. However, the incressing prevalence of insider threats and so...
详细信息
ISBN:
(纸本)9798350395914
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational data, systems, computers, and networks from unauthorized access. However, the incressing prevalence of insider threats and social engineering attack (SEA) presents significant challenges in effectively detecting and mitigating of these risks. A yearly report from 2023 highlighted that despite 90% of companies implementing multiple security measures, they still experienced an average loss of 16 million per incident. The detection capabilities of existing detection methods, which are primarily network-based or host-based intrusion detection, have limitations. This article aims to enhance detection methods through a comprehensive analysis of network and host level insiders' behavior along with Deep Learning approaches. This proposed method of detection provide a unified and holistic detection. Insider threats, whether intentional or unintentional, also create vulnerabilities to external threats and attacks such as phishing and SEA attacks. By addressing the gap in insider threat detection, the proposed comprehensive analysis of insider network and host level activities will enhance detection performance and reduce security costs by compact the existing fragmented detection approaches. As a result the false positive and false negative alarms will reduce the cost of detection and mitigate business operation disturbances. Since insiders interact with network devices and computers as users, integrating their host and network behaviors' into the detection methods offer both enhanced detection capabilities and a unified detection. To evaluate the proposed detection method, an Auto-encoder Deep Learning model will be developed, and public network and host intrusion detesets will be utilized. Evaluation metrics such as Accuracy, precision, recall, and F1- score will be employed. Preliminary analysis results have shown the proposed compre-hensive behavior analysis with Deep Learning (DL)
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ...
详细信息
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN *** it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes(SN)in a WSN is always a challenging *** this research paper,Distance Matrix and Markov Chain(DM-MC)model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the *** method further employs a Markov Chain Model(MCM)for energy optimization and interference *** are performed against two well-known models,and the results demonstrate that the proposed algorithm improves performance by using less network resources when compared to the existing *** probability is used in the Markova chain to sustain higher energy ***,the proposed Distance Matrix and Markov Chain model decrease energy use by 31%and 25%,respectively,compared to the existing DV-Hop and CSA *** experimental results were performed against two proven models,Distance VectorHop Algorithm(DV-HopA)and Crow Search Algorithm(CSA),showing that the proposed DM-MC model outperforms both the existing models regarding localization accuracy and Energy Consumption(EC).These results add to the credibility of the proposed DC-MC model as a better model for employing node localization while establishing a WSN framework.
Community detection is an essential technique for uncovering structural patterns in complex networks, such as social, biological, and information networks. In this paper to explore a hybrid approach to community detec...
详细信息
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ...
详细信息
暂无评论