A rising variety of platforms and software programs have leveraged repository-stored datasets and remote access in recent years. As a result, datasets are more vulnerable to malicious attacks. As a result, network sec...
A rising variety of platforms and software programs have leveraged repository-stored datasets and remote access in recent years. As a result, datasets are more vulnerable to malicious attacks. As a result, network security has grown in importance as a research topic. The usage of intrusion detection systems is a well-known strategy for safeguarding computer networks. This paper proposes an anomaly detection method that blends rule-based and machine-learning-based methods. In order to construct the appropriate rules, a genetic algorithm is utilized. Principal component analysis is used to extract the relevant features aimed to improve the performance. The suggested method is validated experimentally using the KDD Cup 1999 dataset, which meets the requirement of using appropriate data. The proposed method is applied to detect and analyze four types of attacks in a well-known benchmark dataset: Neptune, Ipsweep, Pod, and Teardrop, utilizing Support Vector Machine, Decision Tree, and Naive Bayes algorithms. After testing the characteristics specified in the training phase, the data is classified into attack categories and normal behavior during the machine learning phase.
Nowadays, quality is the most important attribute that creates value. It is considered as the competitive advantage of private and public organizations by which they differentiate their products or services. Quality a...
详细信息
Easy access to time series forecasting provides a strong competitive advantage for any company or organization. As automated forecasting environments become more prevalent in the market, it is crucial to explore their...
详细信息
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and an...
详细信息
ISBN:
(数字)9798350392166
ISBN:
(纸本)9798350392173
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and analyze data on their own making the best use of available resources and providing creative solutions for challenging issues. The impact of AI on productivity, data analysis, flexibility, and real-time decision- making in a variety of fields is examined in this paper. Focusing on academic settings, the paper considers ethical concerns surrounding AI-generated content. According to a survey, even though many students use ChatGPT for writing and research, worries about academic integrity and plagiarism still exist.
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
详细信息
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due to the impossibility of changing the image (such as medical data where high accuracy is required and the appearance of artifacts is unacceptable) or due to the presence of a higher distortion of the container. This algorithm is based on DWT, SVD and operations in the field by modulo 256. The software implementation of the algorithm was developed (using the Accord and *** libraries to implement DWT, SVD). The software implementation of the algorithm was tested. This algorithm has advantages in the form of normalization of the average error, but it needs further research to improve its performance.
Instead of the traditional “system-environment” pair for objects of the regional economy, it is proposed to consider metasystems - these objects together with all interacting objects of the microenvironment. Each ob...
详细信息
ISBN:
(数字)9798350375718
ISBN:
(纸本)9798350375725
Instead of the traditional “system-environment” pair for objects of the regional economy, it is proposed to consider metasystems - these objects together with all interacting objects of the microenvironment. Each object is considered as a point in the multidimensional space of characteristics. Objects are visualized to reflect their development and interaction with other objects.
Autonomous Systems (AS) enable systems to adapt to drastic and unprecedented environmental changes, a capability that can be enhanced through the utilization of Digital Twins (DTs). However, the additional capabilitie...
详细信息
The integration and detection of AI (Artificial Intelligence) in a variety of fields, primarily education, are examined in this paper. With an emphasis on virtual assistants and their uses, it explores the potential a...
详细信息
ISBN:
(数字)9798350376449
ISBN:
(纸本)9798350376456
The integration and detection of AI (Artificial Intelligence) in a variety of fields, primarily education, are examined in this paper. With an emphasis on virtual assistants and their uses, it explores the potential and constraints of such technology. A study was conducted with students at the Technical University of Sofia, to assess their ability to distinguish between texts written by humans and AI. The results showcase that learners need to develop their critical analysis skills evidenced by their mixed expertise.
Optimistic versioning is a key component in supporting collaborative workflows. Text-based versioning has been widely adopted for versioning code, but in model-driven engineering, dealing with visual concrete syntaxes...
详细信息
暂无评论