Vanilla image completion approaches exhibit sensitivity to large missing regions, attributed to the limited availability of reference information for plausible generation. To mitigate this, existing methods incorporat...
详细信息
Exchange of data in networks necessitates provision of security and *** networks compromised by intruders are those where the exchange of data is at high *** main objective of this paper is to present a solution for s...
详细信息
Exchange of data in networks necessitates provision of security and *** networks compromised by intruders are those where the exchange of data is at high *** main objective of this paper is to present a solution for secure exchange of attack signatures between the nodes of a distributed *** activities are monitored and detected by the Intrusion Detection System(IDS)that operates with nodes connected to a distributed *** IDS operates in two phases,where the first phase consists of detection of anomaly attacks using an ensemble of classifiers such as Random forest,Convolutional neural network,and XGBoost along with genetic algorithm to improve the performance of *** novel attacks detected in this phase are converted into signatures and exchanged further through the network using the blockchain framework in the second *** phase uses the cryptosystem as part of the blockchain to store data and secure it at a higher *** blockchain is implemented using the Hyperledger Fabric v1.0 and v2.0,to create a prototype for secure signature *** exchanges signatures in a much more secured manner using the blockchain architecture when implemented with version 2.0 of Hyperl-edger *** performance of the proposed blockchain system is evaluated on UNSW NB15 *** performance has been evaluated in terms of execution time,average latency,throughput and transaction processing *** evidence of the proposed IDS system demonstrates improved performance with accuracy,detection rate and false alarm rate(FAR)as key parameters *** and detection rate increase by 2%and 3%respectively whereas FAR reduces by 1.7%.
The process for automatic modulation recognition (AMR) is important to industrial cognitive radio Models. Although they have made significant strides in modulation detection, state-of-the-art real-valued CNNs compromi...
详细信息
Non-governmental organizations (NGOs) play a pivotal role in addressing some of the most pressing environmental and social challenges across the globe. With the rise of advanced technologies, NGOs have an unprecedente...
详细信息
Printed Circuit Boards(PCBs)are materials used to connect components to one another to form a working *** play a crucial role in modern electronics by connecting various *** trend of integrating more components onto P...
详细信息
Printed Circuit Boards(PCBs)are materials used to connect components to one another to form a working *** play a crucial role in modern electronics by connecting various *** trend of integrating more components onto PCBs is becoming increasingly common,which presents significant challenges for quality control *** the potential impact that even minute defects can have on signal traces,the surface inspection of PCB remains pivotal in ensuring the overall system *** address the limitations associated with manual inspection,this research endeavors to automate the inspection process using the YOLOv8 deep learning algorithm for real-time fault detection in ***,we explore the effectiveness of two variants of the YOLOv8 architecture:YOLOv8 Small and YOLOv8 *** rigorous experimentation and evaluation of our dataset which was acquired from Peking university’s Human-Robot Interaction Lab,we aim to assess the suitability of these models for improving fault detection accuracy within the PCB manufacturing *** results reveal the remarkable capabilities of YOLOv8 Small models in accurately identifying and classifying PCB *** model achieved a precision of 98.7%,a recall of 99%,an accuracy of 98.6%,and an F1 score of *** findings highlight the potential of the YOLOv8 Small model to significantly improve the quality control processes in PCB manufacturing by providing a reliable and efficient solution for fault detection.
Data valuation is a class of techniques for quantitatively assessing the value of data for applications like pricing in data marketplaces. Existing data valuation methods define a value for a discrete dataset. However...
A brain tumor develops when cells in the brain divide in an abnormal way that is not controlled by the body. This results in the growth of the tumor. Manual dissection of brain tumors identified by MRI is a process th...
详细信息
Nowadays, crime has become a way to get people and people into trouble. Rising crime has fueled unrest at polling stations across the country. Understanding crime patterns is necessary to identify and respond to these...
详细信息
In this day and age, corporations are moving towards data driven decision making. They are utilizing data to make applications that can assist them with business intelligence. Data assists them with working on their e...
详细信息
In general, the dynamic data optimization technique is used to place the user’s data in a cloud system to reduce the latency, intercommunication traffic, data transfer cost, execution cost, load balancing, and bandwi...
详细信息
暂无评论