While a lot of research has been done in system design, reducing computational complexity is still a core problem in information systems. In order to break through the bottleneck of computing efficiency, this paper dr...
详细信息
Intelligent machines are knowledge systems with unique knowledge structure and *** this paper,we discuss issues including the characteristics and forms of machine knowledge,the relationship between knowledge and human...
详细信息
Intelligent machines are knowledge systems with unique knowledge structure and *** this paper,we discuss issues including the characteristics and forms of machine knowledge,the relationship between knowledge and human cognition,and the approach to acquire machine *** issues are of great significance to the development of artificial intelligence.
Crime forecasting has been one of the most complex challenges in law enforcement today, especially when an analysis tends to evaluate inferable and expanded crime rates, although a few methodologies for subsequent equ...
Crime forecasting has been one of the most complex challenges in law enforcement today, especially when an analysis tends to evaluate inferable and expanded crime rates, although a few methodologies for subsequent equivalents have been embraced before. In this work, we use a strategy for a time series model and machine testing systems for crime estimation. The paper centers on determining the quantity of crimes. Considering various experimental analyses, this investigation additionally features results obtained from a neural system that could be a significant alternative to machine learning and ordinary stochastic techniques. In this paper, we applied various techniques to forecast the number of possible crimes in the next 5 years. First, we used the existing machine learning techniques to predict the number of crimes. Second, we proposed two approaches, a modified autoregressive integrated moving average model and a modified artificial neural network model. The prime objective of this work is to compare the applicability of a univariate time series model against that of a variate time series model for crime forecasting. More than two million datasets are trained and tested. After rigorous experimental results and analysis are generated, the paper concludes that using a variate time series model yields better forecasting results than the predicted values from existing techniques. These results show that the proposed method outperforms existing methods.
The information technology's new revolution is Internet of Things (IoT), where physical world is connected to the internet. IoT applications are diversified such as smart health, smart industry, smart homes and mo...
详细信息
ISBN:
(数字)9781728149707
ISBN:
(纸本)9781728149714
The information technology's new revolution is Internet of Things (IoT), where physical world is connected to the internet. IoT applications are diversified such as smart health, smart industry, smart homes and most importantly smart logistics for perishable items conservation. Although IoT devices have revolutionized world but due to their constrained nature they are at the cost of a greater risk of personal data loss, security breaches and misuse. In this research, a review is presented for proposing two state of the art modules i.e. communication model of smart logistics and security of IoT devices in Smart Logistics. As the smart logistics have perishable items i.e. fruits, vegetables, meat, medicine, chemicals, and cosmetics etc. which are sensitive to temperature, humidity and pressure etc. If the sensors monitoring these items have been handled abnormally due to security attacks, it will give huge loss. Therefore, security of smart logistics is of paramount importance in this research. In order to expedite research in this emergent area of IoT, in this research paper a brief review on progress of IoT in smart logistics, and its security has been presented.
software rejuvenation has been proposed to guarantee safety of cyber-physical systems (CPSs) against cyber-attacks. Recent work has demonstrated how this method can be applied to more general control problems such as ...
详细信息
software rejuvenation has been proposed to guarantee safety of cyber-physical systems (CPSs) against cyber-attacks. Recent work has demonstrated how this method can be applied to more general control problems such as tracking control. Despite this progress, there are still limitations in applying software rejuvenation to real situations where the presence of persistent attacks and physical environment constraints exist. In this paper we address these issues and propose a secure recovery algorithm that can be deployed not only for recovery against persistent attacks but also in situations where physical environment constraints do not allow the system to tolerate any attack. The effectiveness of the approach is illustrated with a simulation of a quadrotor landing on the ground during recovery from a persistent attack.
The position paper summarizes the inputs of a set of experts from academia and industry presenting their view on chances and challenges of using ChatGPT within the Modelling and Simulation education. They also address...
详细信息
Detecting Distributed Denial of Service (DDoS) attacks in software-Defined Internet of Things (SD-IoT) networks is challenging due to vulnerabilities in single-controller architectures, the limitations of the OpenFlow...
Detecting Distributed Denial of Service (DDoS) attacks in software-Defined Internet of Things (SD-IoT) networks is challenging due to vulnerabilities in single-controller architectures, the limitations of the OpenFlow protocol, evolving DDoS strategies, and resource constraints. This research proposes a multi-layered security framework that integrates deception-based security, cloud-integrated machine learning (ML), a new hierarchically distributed multi-controller (HDMC) architecture, P4-enabled real-time traffic monitoring, and adaptive mitigation. The framework includes dynamic time-based windowing for enhanced detection, a decoy network to divert attackers, and a cloud-based multi-task ML model (MT-EDD) for attack classification. It also features a synchronized multi-control design for secure communication and coordinated actions among multiple controllers and a dynamic monitoring algorithm for real-time traffic analysis. P4 switches extract features from network traffic and send them to a cloud-based server for preprocessing and analysis by a pre-trained ensemble learning model (MT-EDD), which predicts attack states and communicates results to the central controller for mitigation. The controller then enforces appropriate mitigation actions on P4 switches. This approach offloads computationally intensive tasks to the cloud, improving scalability and detection accuracy. Evaluations show the framework achieves an average accuracy of 98.42%, precision of 96.17%, recall of 94.72%, F1-score of 95.39%, and specificity of 98.22%. The proposed P4-enabled solution consumes 30% less bandwidth and 25% less CPU, reduces detection times by 54.3%, and improves detection accuracy by 5.2% compared to the OpenFlow-enabled method. The HDMC architecture, evaluated against a single-controller setup, demonstrated 40% higher throughput and 32% lower latency, confirming its superior performance across multiple metrics.
Background: In many modern applications, information filtering is now used that exposes users to a collection of data. In such systems, the users are provided with recommended items’ list they might prefer or predict...
详细信息
—In this work, we propose an effective scheme (called DP-Net) for compressing the deep neural networks (DNNs). It includes a novel dynamic programming (DP) based algorithm to obtain the optimal solution of weight qua...
详细信息
暂无评论