Over the last decade, a surge in multimedia data has significantly impacted research areas like multimedia retrieval, database management, and medical imaging. Traditional machine learning methods often struggle with ...
详细信息
Network errors are a significant issue in cloud computing. Occasionally, issues with cloud networks may cause productivity to drop considerably. The primary objective of this research is to employ machine learning tec...
详细信息
In an increasingly digitized world, secure communication plays a pivotal role in safeguarding sensitive information and ensuring the confidentiality of data transmission. Conventional encryption techniques are robust ...
详细信息
Lassa fever is a type of viral hemorrhagic fever with high fatality rate. Precise and prompt diagnosis and successful treatment of this disease is very important in the control and prevention of the spread as unrestri...
详细信息
Stress is a significant health concern, impacting both physical and mental well-being. Prolonged exposure to stress can lead to numerous physical health issues, including cardiovascular diseases, and a weakened immune...
详细信息
As the global semiconductor industry moving towards successive generations, the density of Integrated Circuit increased, therefore reliability issues became critically high, among them Negative Bias Temperature Instab...
详细信息
Plants is one of the major food sources for world population. In addition to that, some plants and their outcomes are used in food preparation. One of the plants which is widely used in foods and having huge medicinal...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
The Internet of Things (IoT) is the result of the expansion of modern technology, which has led to the development of numerous connected devices that are able to communicate with one another and collect vast amounts o...
详细信息
Graph theory is an important branch of mathematics which is used to solve variety of problems in computerscience by structural models. This structural modeling makes the computer discipline problems to find solution ...
详细信息
暂无评论