In this paper, we delve into the investigation of locating broadcast 2-centers of a tree T under the postal model. The problem asks to deploy two broadcast centers so that the maximum communication time from the cente...
详细信息
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-based computing provides services like sharing resources e.g. network, storage, applications and software through the Internet. ...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
Drones are flying objects that may be controlled remotely or programmed to do a wide range of tasks, including aerial photography, videography, surveys, crop and animal monitoring, search and rescue missions, package ...
详细信息
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi...
详细信息
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basic *** images captured by wearable sensors contain advanced features,allowing them to be analyzed by deep learning algorithms to enhance the detection and recognition of human *** lighting and limited sensor capabilities can impact data quality,making the recognition of human actions a challenging *** unimodal-based HAR approaches are not suitable in a real-time ***,an updated HAR model is developed using multiple types of data and an advanced deep-learning ***,the required signals and sensor data are accumulated from the standard *** these signals,the wave features are *** the extracted wave features and sensor data are given as the input to recognize the human *** Adaptive Hybrid Deep Attentive Network(AHDAN)is developed by incorporating a“1D Convolutional Neural Network(1DCNN)”with a“Gated Recurrent Unit(GRU)”for the human activity recognition ***,the Enhanced Archerfish Hunting Optimizer(EAHO)is suggested to fine-tune the network parameters for enhancing the recognition *** experimental evaluation is performed on various deep learning networks and heuristic algorithms to confirm the effectiveness of the proposed HAR *** EAHO-based HAR model outperforms traditional deep learning networks with an accuracy of 95.36,95.25 for recall,95.48 for specificity,and 95.47 for precision,*** result proved that the developed model is effective in recognizing human action by taking less ***,it reduces the computation complexity and overfitting issue through using an optimization approach.
The provision of rebate to needy/underprivileged sections of society has been in practice since long in government organizations. The efficacy of such provisions lies in the fact that whether this rebate reaches peopl...
详细信息
The skin acts as an important barrier between the body and the external environment, playing a vital role as an organ. The application of deep learning in the medical field to solve various health problems has generat...
详细信息
This study explores Agile software Development (ASD) methodologies' effectiveness in achieving quality software products. It investigates the underexplored application of ChatGPT as a Quality Attribute Extractor i...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
This paper investigates dynamic anomaly detection in resource-constrained environments by leveraging Robust Random Cut Forests (RRCF). Anomaly detection is crucial for maintaining the integrity and security of data st...
详细信息
This paper investigates dynamic anomaly detection in resource-constrained environments by leveraging Robust Random Cut Forests (RRCF). Anomaly detection is crucial for maintaining the integrity and security of data streams in Internet of Things (IoT) environments, where data is continuously generated and often subject to noise and fluctuations. We begin with a comprehensive exploration of resilient random cut data structures tailored for analyzing incoming data streams, highlighting their effectiveness in adapting to the dynamic nature of *** methodology encompasses extensive experimentation with diverse datasets, including real-time Arduino data and benchmark datasets such as IoT-23 and CIC-IoT. Through this approach, we assess the performance of the RRCF algorithm under various scenarios, focusing on its capability to accurately identify trends and anomalies over time. Notably, we achieve significant performance improvements, with an average Area Under the Curve (AUC) of 95.6 and an F1 score of 0.86, demonstrating RRCF’s effectiveness in real-time anomaly *** further enhance detection accuracy, we introduce dynamic thresholds that adapt to changing data characteristics, allowing our model to maintain robust performance even in the presence of noise. Detailed evaluations reveal that our approach consistently outperforms existing state-of-the-art methods, particularly in terms of handling noisy data and ensuring computational efficiency under resource *** findings underscore the potential of RRCF as a powerful tool for real-time applications within IoT systems, providing a solid theoretical foundation for future advancements in dynamic anomaly detection. By investigating non-parametric anomalies and analyzing the influence of external factors on data integrity, we uncover hidden patterns amidst dynamic fluctuations. This research emphasizes the need for adaptive strategies in evolving data landscapes, laying the groundwork for enhanced resil
暂无评论