The paper presents a novel approach to address the problem of lifetime maximization in Wireless Sensor Networks (WSNs) with limited initial energy constraints. The authors introduce a scheduling approach called Non-di...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT *** rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT *** DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT *** BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal *** experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy *** are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack *** method,without feature selection,demonstrates advantages in training time and detection ***,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining ...
详细信息
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining images obtained from both modalities allows for leveraging their respective strengths and mitigating individual limitations,resulting in high-quality images with enhanced contrast and rich texture *** capabilities hold promising applications in advanced visual tasks including target detection,instance segmentation,military surveillance,pedestrian detection,among *** paper introduces a novel approach,a dual-branch decomposition fusion network based on AutoEncoder(AE),which decomposes multi-modal features into intensity and texture information for enhanced *** contrast enhancement module(CEM)and texture detail enhancement module(DEM)are devised to process the decomposed images,followed by image fusion through the *** proposed loss function ensures effective retention of key information from the source images of both *** comparisons and generalization experiments demonstrate the superior performance of our network in preserving pixel intensity distribution and retaining texture *** the qualitative results,we can see the advantages of fusion details and local *** the quantitative experiments,entropy(EN),mutual information(MI),structural similarity(SSIM)and other results have improved and exceeded the SOTA(State of the Art)model as a whole.
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiag...
详细信息
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiagent sys-tems sensing and acting in an environment contribute to adaptive cyber *** present a learning strategy that enables multiple agents to learn optimal poli-cies using multiagent reinforcement learning(MARL).Our proposed approach is inspired by the multiarmed bandits(MAB)learning technique for multiple agents to cooperate in decision making or to work *** study a MAB approach in which defenders visit a system multiple times in an alternating fash-ion to maximize their rewards and protect their *** find that this game can be modeled from an individual player’s perspective as a restless MAB *** discover further results when the MAB takes the form of a pure birth process,such as a myopic optimal policy,as well as providing environments that offer the necessary incentives required for cooperation in multiplayer projects.
Internet of Things(IoTs)provides better solutions in various fields,namely healthcare,smart transportation,home,*** Denial of Service(DoS)outbreaks in IoT platforms is significant in certifying the accessibility and i...
详细信息
Internet of Things(IoTs)provides better solutions in various fields,namely healthcare,smart transportation,home,*** Denial of Service(DoS)outbreaks in IoT platforms is significant in certifying the accessibility and integrity of IoT *** learning(DL)models outperform in detecting complex,non-linear relationships,allowing them to effectually severe slight deviations fromnormal IoT activities that may designate a DoS *** uninterrupted observation and real-time detection actions of DL participate in accurate and rapid detection,permitting proactive reduction events to be executed,hence securing the IoT network’s safety and ***,this study presents pigeon-inspired optimization with a DL-based attack detection and classification(PIODL-ADC)approach in an IoT *** PIODL-ADC approach implements a hyperparameter-tuned DL method for Distributed Denial-of-Service(DDoS)attack detection in an IoT ***,the PIODL-ADC model utilizes Z-score normalization to scale input data into a *** handling the convolutional and adaptive behaviors of IoT,the PIODL-ADCmodel employs the pigeon-inspired optimization(PIO)method for feature selection to detect the related features,considerably enhancing the recognition’s ***,the Elman Recurrent Neural Network(ERNN)model is utilized to recognize and classify DDoS ***,reptile search algorithm(RSA)based hyperparameter tuning is employed to improve the precision and robustness of the ERNN method.A series of investigational validations is made to ensure the accomplishment of the PIODL-ADC *** experimental outcome exhibited that the PIODL-ADC method shows greater accomplishment when related to existing models,with a maximum accuracy of 99.81%.
Moving target detection is one of the most basic tasks in computer *** conventional wisdom,the problem is solved by iterative optimization under either Matrix Decomposition(MD)or Matrix Factorization(MF)*** utilizes f...
详细信息
Moving target detection is one of the most basic tasks in computer *** conventional wisdom,the problem is solved by iterative optimization under either Matrix Decomposition(MD)or Matrix Factorization(MF)*** utilizes foreground information to facilitate background *** uses noise-based weights to fine-tune the *** both noise and foreground information contribute to the recovery of the *** jointly exploit their advantages,inspired by two framework complementary characteristics,we propose to simultaneously exploit the advantages of these two optimizing approaches in a unified framework called Joint Matrix Decomposition and Factorization(JMDF).To improve background extraction,a fuzzy factorization is *** fuzzy membership of the background/foreground association is calculated during the factorization process to distinguish their contributions of both to background *** describe the spatio-temporal continuity of foreground more accurately,we propose to incorporate the first order temporal difference into the group sparsity constraint *** temporal constraint is adjusted *** foreground and the background are jointly estimated through an effective alternate optimization process,and the noise can be modeled with the specific probability *** experimental results of vast real videos illustrate the effectiveness of our *** with the current state-of-the-art technology,our method can usually form the clearer background and extract the more accurate ***-noise experiments show the noise robustness of our method.
With the recent demonstration of quantum computers,interests in the field of reversible logic synthesis and optimization have taken a different *** every quantum operation is inherently reversible,there is an immense ...
详细信息
With the recent demonstration of quantum computers,interests in the field of reversible logic synthesis and optimization have taken a different *** every quantum operation is inherently reversible,there is an immense motivation for exploring reversible circuit design and *** it comes to faults in circuits,the parity-preserving feature donates to the detection of permanent and temporary *** the context of reversible circuits,the parity-preserving property ensures that the input and output parities are *** this paper we suggest six parity-preserving reversible blocks(ZFATSL)with improved quantum *** reversible blocks are synthesized using an existing synthesis method that generates a netlist of multiple-control Toffoli(MCT)*** optimization rules are applied at the reversible circuit level,followed by transformation into a netlist of elementary quantum gates from the NCV *** designs of full-adder and unsigned and signed multipliers are proposed using the functional blocks that possess parity-preserving *** proposed designs are compared with state-of-the-art methods and found to be better in terms of cost of *** savings of 25.04%,20.89%,21.17%,and 51.03%,and 18.59%,13.82%,13.82%,and 27.65% respectively,are observed for 4-bit unsigned and 5-bit signed multipliers in terms of quantum cost,garbage output,constant input,and gate count as compared to recent works.
The skin acts as an important barrier between the body and the external environment, playing a vital role as an organ. The application of deep learning in the medical field to solve various health problems has generat...
详细信息
We proposed a novel image-enhancing framework to ensure consolidated restoration accuracy when remedying the visual quality of dehazed images, such as over-saturation, color deviation, or luminance issues. Conventiona...
详细信息
Arabic language resources and natural language processing technologies have seen significant advancements in recent years. The detection of idiomatic expressions is a crucial problem in Arabic natural language process...
详细信息
暂无评论