Toddler activity recognition aims in finding out the activities of toddler and also toddlers based on the video captured by camera. The purpose of activity recognition is to monitor a new employee of the company (mayb...
详细信息
Manufacture and sale of counterfeit goods has been plaguing several business sectors for many years. The production of counterfeit goods are increasing, this has an impact on the sales and earnings of the businesses. ...
详细信息
The Motor Vehicle Act is a complex legal framework that regulates various aspects of motor vehicle usage in India. However, many individuals lack knowledge and understanding of the Act, which can lead to unsafe drivin...
详细信息
Detecting suspicious activities in public places with higher people gathering and interaction has turned out to be an act with growing interest due to the increasing number of crime scenes and causalities happening in...
详细信息
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat...
详细信息
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,*** terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal *** is challenging to identify a specific attack due to complex features and data imbalance *** address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced ***,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,***,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic ***,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority ***,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network ***,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep *** experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and *** explainable AI approach is implemented to interpret the proposed method and develop a trustable model.
During natural disasters and catastrophes, Twitter is becoming a more popular source of information exchange. It is primarily used to share the status of disaster recovery efforts initiated by humanitarian and disaste...
详细信息
Deception detection is gaining increasing interest due to ethical and security concerns. This paper explores the application of convolutional neural networks for the purpose of multimodal deception detection. We use a...
详细信息
Weather Forecasting is the application of AI to predict the state of the atmosphere for a given location. Earlier, weather forecasting methods usually relied on observed patterns of events. Our ancestors predicted the...
详细信息
Brain tumor identification and classification play a crucial role in medical imaging. Accurately identifying tumors is a challenging task that often requires highly skilled and experienced doctors. Manual identificati...
详细信息
The pharmaceutical industry's crucial task is to look after the medicines while they are being transported, by ensuring ideal storage conditions and keeping track of the complete medications sent to prevent risky ...
详细信息
暂无评论