Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe...
详细信息
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designed with security because they are resource constrained ***,having an accurate IoT security system to detect security attacks is *** Detection Systems(IDSs)using machine learning and deep learning techniques can detect security attacks *** paper develops an IDS architecture based on Convolutional Neural Network(CNN)and Long Short-Term Memory(LSTM)deep learning *** implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that cate-gorizes the network traffic into normal and attacks *** this work,interpolation data preprocessing is used to compute the missing ***,the imbalanced data problem is solved using a synthetic data generation *** experiments have been implemented to compare the performance results of the proposed model(CNN+LSTM)with a basic model(CNN only)using both balanced and imbalanced ***,with some state-of-the-art machine learning classifiers(Decision Tree(DT)and Random Forest(RF))using both balanced and imbalanced *** results proved the impact of the balancing *** proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy(92.10%)compared with the basic CNN model(89.90%)and the machine learning(DT 88.57%and RF 90.85%)***,comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
Metaverse-based virtual worlds can provide users with an immersive digital experience by utilizing extended reality, IoT, 6G communication, and computing technology. Unlike the multiverse, in which users can access on...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device *** home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical *** paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in *** have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT *** system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing *** have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache *** feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time *** is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation ***,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber *** trial results support the proposed system and demonstrate its potential for use in everyday life.
Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transp...
详细信息
Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transportationsystem. The movement of vehicles and the three-dimensional (3D) nature of the road network cause the topologicalstructure of IoV to have the high space and time *** modeling and structure recognition for 3Droads can benefit the description of topological changes for IoV. This paper proposes a 3Dgeneral roadmodel basedon discrete points of roads obtained from GIS. First, the constraints imposed by 3D roads on moving vehicles areanalyzed. Then the effects of road curvature radius (Ra), longitudinal slope (Slo), and length (Len) on speed andacceleration are studied. Finally, a general 3D road network model based on road section features is *** paper also presents intersection and road section recognition methods based on the structural features ofthe 3D road network model and the road features. Real GIS data from a specific region of Beijing is adopted tocreate the simulation scenario, and the simulation results validate the general 3D road network model and therecognitionmethod. Therefore, thiswork makes contributions to the field of intelligent transportation by providinga comprehensive approach tomodeling the 3Droad network and its topological changes in achieving efficient trafficflowand improved road safety.
Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network...
详细信息
Automatic Human Action Recognition (HAR) using RGB-D (Red, Green, Blue, and Depth) videos captivated a lot of attention in the pattern classification field due to low-cost depth cameras. Feature extraction in action r...
详细信息
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more e...
详细信息
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more efficient and reliable intrusion detection systems(IDSs).However,the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based *** researchers used data preprocessing techniques such as feature selection and normalization to overcome such *** most of these researchers reported the success of these preprocessing techniques on a shallow level,very few studies have been performed on their effects on a wider ***,the performance of an IDS model is subject to not only the utilized preprocessing techniques but also the dataset and the ML/DL algorithm used,which most of the existing studies give little emphasis ***,this study provides an in-depth analysis of feature selection and normalization effects on IDS models built using three IDS datasets:NSL-KDD,UNSW-NB15,and CSE–CIC–IDS2018,and various AI algorithms.A wrapper-based approach,which tends to give superior performance,and min-max normalization methods were used for feature selection and normalization,*** IDS models were implemented using the full and feature-selected copies of the datasets with and without *** models were evaluated using popular evaluation metrics in IDS modeling,intra-and inter-model comparisons were performed between models and with state-of-the-art *** forest(RF)models performed better on NSL-KDD and UNSW-NB15 datasets with accuracies of 99.86%and 96.01%,respectively,whereas artificial neural network(ANN)achieved the best accuracy of 95.43%on the CSE–CIC–IDS2018 *** RF models also achieved an excellent performance compared to recent *** results show that normalization and feature selection positively affect IDS ***,while feature sel
Power efficiency is a critical design objective in modern microprocessor design. To evaluate the impact of architectural-level design decisions, an accurate yet efficient architecture-level power model is desired. How...
详细信息
This study employs transfer learning using a fine-tuned pretrained EfficientNetB0 convolutional neural network (CNN) model to accurately detect the various stages of Diabetic Retinopathy. The training process involved...
详细信息
Slot filling,to extract entities for specific types of information(slot),is a vitally important modular of dialogue systems for automatic *** responses can be regarded as the weak supervision of patient *** this way,a...
详细信息
Slot filling,to extract entities for specific types of information(slot),is a vitally important modular of dialogue systems for automatic *** responses can be regarded as the weak supervision of patient *** this way,a large amount of weakly labeled data can be obtained from unlabeled diagnosis dialogue,alleviating the problem of costly and time-consuming data ***,weakly labeled data suffers from extremely noisy *** alleviate the problem,we propose a simple and effective Co-WeakTeaching *** method trains two slot filling models *** two models learn from two different weakly labeled data,ensuring learning from two ***,one model utilizes selected weakly labeled data generated by the other,*** model,obtained by the Co-WeakTeaching on weakly labeled data,can be directly tested on testing data or sequentially fine-tuned on a small amount of human-annotated *** results on these two settings illustrate the effectiveness of the method with an increase of 8.03%and 14.74%in micro and macro f1 scores,respectively.
暂无评论