Automatic Human Action Recognition (HAR) using RGB-D (Red, Green, Blue, and Depth) videos captivated a lot of attention in the pattern classification field due to low-cost depth cameras. Feature extraction in action r...
详细信息
Cloud computing has gained significant popularity as a platform for processing large-scale data analytics, offering benefits such as high availability, robustness, and cost-effectiveness. However, job scheduling in cl...
详细信息
Wireless Body Area Networks (WBANs) have emerged as a transformative technology for health monitoring, leveraging sensor nodes placed on or within the human body. This paradigm offers real-time insights into physiolog...
详细信息
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar...
详细信息
With the widespread adoption of laser welding technology in modern manufacturing, the online and real-time inspection of welding quality has become an urgent issue in the manufacturing sector. Addressing this challeng...
详细信息
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai...
详细信息
Aiming at the security problem of range gated laser imaging in high noise background,a range gated laser image encryption scheme based on the quantum genetic algorithm(QGA)is *** to the fuzziness of the laser image it...
详细信息
Aiming at the security problem of range gated laser imaging in high noise background,a range gated laser image encryption scheme based on the quantum genetic algorithm(QGA)is *** to the fuzziness of the laser image itself,the randomness and security of the key become more and more important in *** this paper,the chaotic sequence is used as the parent chromosome of the QGA,and the random number satisfying the encryption algorithm is obtained by an iterative genetic *** further improve the security of laser images,some random pixels are stochastically inserted around the laser image before *** random pixels are scrambled together with the ***,an adaptive diffusion method is designed to completely change the original statistical information of the *** simulation and performance analysis show that the scheme has high security.
The advancements in sensors, processing, storage and networking technologies have turned smartphone into de facto lifelogging device. Realizing the lifelogging potential of smartphone, researchers have postulated with...
详细信息
Serverless computing has shifted cloud server management responsibilities away from end users and towards service providers. Serverless computing offers greater scalability, flexibility, ease of deployment, and cost-e...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has expanded the potential targets that hackers might *** adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or *** identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious *** research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)*** proposed model can identify various types of cyberattacks,including conventional and distinctive *** networks,a specific kind of feedforward neural networks,possess an intrinsic memory *** Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended *** such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual *** are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection *** model utilises Recurrent Neural Networks,specifically exploiting LSTM *** proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques.
暂无评论