Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injec...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for *** overcome these obstacles,researchers have created several network IDS models,such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning *** study provides an updated learning strategy for artificial neural network(ANN)to address data categorization problems caused by unbalanced *** to traditional approaches,the augmented ANN’s 92%accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity,brought about by the addition of a random weight and standard *** the ever-evolving nature of cybersecurity threats,this study introduces a revolutionary intrusion detection method.
Predicting crimes before they occur can save lives and losses of property. With the help of machine learning, many researchers have studied predicting crimes extensively. In this paper, we evaluate state-of-the-art cr...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in order to prolong network lifetime;owing to resource-constrained nature of *** fundamental requirement of any network is routing a packet from its source to *** of a routing algorithm depends on the number of network parameters utilized by that routing *** the recent years,various routing protocol has been developed for the delay tolerant networks(DTN).A routing protocol known as spray and wait(SnW)is one of the most widely used routing algorithms for *** this paper,we study the SnW routing protocol and propose a modified version of it referred to as Pentago SnW which is based on pentagonal number *** to binary SnW shows promising results through simulation using real-life scenarios of cars and pedestrians randomly moving on a map.
We present a family of generalized simultaneous perturbation-based gradient search (GSPGS) estimators that use noisy function measurements. The number of function measurements required by each estimator is guided by t...
详细信息
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g...
详细信息
The correlation of security alerts is crucial for effective threat detection and mitigation in modern cybersecurity landscapes. With the exponential growth in the volume of generated alerts, there arises an imperative...
详细信息
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ...
详细信息
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical data is available, yet the vast majority of it is wasted. It will b...
详细信息
Scientific modeling provides mathematical abstractions of real-world systems and builds software as implementations of these mathematical *** science is a multidisciplinary discipline developing scientific models and ...
详细信息
Scientific modeling provides mathematical abstractions of real-world systems and builds software as implementations of these mathematical *** science is a multidisciplinary discipline developing scientific models and simulations as ocean sys-tem models that are an essential research *** softwareengineering and information systems research,modeling is also an essential *** particular,business process modeling for business process management and systems engineering is the activity of representing processes of an enterprise,so that the current process may be analyzed,improved and *** this paper,we employ process modeling for analyzing sci-entific software development in ocean science to advance the state in engineering of ocean system models and to better understand how ocean system models are developed and maintained in ocean *** interviewed domain experts in semi-structured inter-views,analyzed the results via thematic analysis,and modeled the results via the Busi-ness Process Modeling Notation(BPMN).The processes modeled as a result describe an aspired state of software development in the domain,which are often not(yet)*** enables existing processes in simulation-based system engineering to be improved with the help of these process models.
暂无评论