Bengali Handwritten Text Recognition (HTR) is a challenging task due to the text's cursive disposition and significant variations in the graphemic unit, the smallest written unit in alphasyllabary languages. These...
详细信息
Smartphones as a means of communication are not only used to send and receive messages and make phone calls. Today's smartphones are also intended to store personal data and sensitive information hence it is vulne...
详细信息
A scheme for edge computing-enabled offloading in a digital twin (DT) enabled heterogeneous network (HetNet) of multi-services IoT devices (IDs) is proposed. This scheme optimizes the association and handover of IDs, ...
详细信息
The Internet of Vehicles (IoV) has become one challenging communication technology in the current internet world. IoV enables real-time data exchange between vehicles, road infrastructures, and mobile communication de...
详细信息
Gene expression analysis plays a crucial role in understanding biological processes and diseases. However, the high-dimensional nature of gene expression data poses challenges for its analysis and interpretation. Clus...
详细信息
Participatory budgeting refers to the practice of allocating public resources by collecting and aggregating individual preferences. Most existing studies in this field often assume an additive utility function, where ...
详细信息
In recent years, fog computing has extended cloud services to the network edge, lowering network latency and congestion and overcoming cloud computing restrictions. Many hurdles, however, must be overcome before the b...
详细信息
Smart grids are at risk of cyber-attacks due to more connected devices being introduced. Different kinds of attacks may incur different consequences in the operation of smart grids. Attackers have identified different...
详细信息
One of the greatest developments in computerscience is undoubtedly quantum computing. It has demonstrated to give various benefits over the classical algorithms, particularly in the significant reduction of processin...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
暂无评论