Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe...
详细信息
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designed with security because they are resource constrained ***,having an accurate IoT security system to detect security attacks is *** Detection systems(IDSs)using machine learning and deep learning techniques can detect security attacks *** paper develops an IDS architecture based on Convolutional Neural Network(CNN)and Long Short-Term Memory(LSTM)deep learning *** implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that cate-gorizes the network traffic into normal and attacks *** this work,interpolation data preprocessing is used to compute the missing ***,the imbalanced data problem is solved using a synthetic data generation *** experiments have been implemented to compare the performance results of the proposed model(CNN+LSTM)with a basic model(CNN only)using both balanced and imbalanced ***,with some state-of-the-art machine learning classifiers(Decision Tree(DT)and Random Forest(RF))using both balanced and imbalanced *** results proved the impact of the balancing *** proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy(92.10%)compared with the basic CNN model(89.90%)and the machine learning(DT 88.57%and RF 90.85%)***,comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
In neurosurgery to remove brain tumors, DICOM data, a medical imaging standard, is generated preoperatively using CT and MRI. This data is used for surgical planning. However, brain deformation problems, known as brai...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS *** this paper,a Fuzzy C-Means(FCM)clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by ***,a time series dataset is created in the time domain using AEFS *** AEFS-based weather is evaluated according to the time-series Membership Degree(MD)changes obtained by inputting this dataset into the ***,thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF ***,a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space ***,the rationality and reliability of the proposed method are verified by combining radar charts and expert *** results confirm that this method accurately characterizes the weather attributes and changes in the AEFS,and a negative distance-MD correlation is obtained for the first *** detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
Stress is a problem with various adverse effects, such as mental disorders and suicide. With these problems arising, a stress detection system is needed as an initial examination of the level of stress experienced. Ge...
详细信息
The agricultural area has undergone a significant transformation owing to the progress made in IoT. It is imperative to have a dependable remote monitoring solution right now. This study aims to accomplish two goals. ...
详细信息
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined co...
详细信息
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined convergence time for the PEG,a PTNE seeking algorithm has been developed to facilitate collaboration among multiple pursuers for capturing the evader without the need for any global ***,it is theoretically proved that the prescribedtime convergence of the designed algorithm for achieving Nash equilibrium of ***,the effectiveness of the PTNE method was validated by numerical simulation results.A PEG consists of two groups of agents:evaders and *** pursuers aim to capture the evaders through cooperative efforts,while the evaders strive to evade *** is a classic noncooperative *** has attracted plenty of attention due to its wide application scenarios,such as smart grids[1],formation control[2],[3],and spacecraft rendezvous[4].It is noteworthy that most previous research on seeking the Nash equilibrium of the game,where no agent has an incentive to change its actions,has focused on asymptotic and exponential convergence[5]-[7].
Research on real-time data visualization methods is necessary to achieve the most accurate and clear representation of information. Creating specific boards and modifying current platforms are two key tasks in perform...
详细信息
In recent years, maximizing the energy conversion performance of photovoltaic (PV) systems has become increasingly important, especially in the context of sustainable energy development. This study utilizes Internet o...
详细信息
With the increase of energy consumption worldwide in several domains such as industry,education,and transportation,several technologies played an influential role in energy conservation such as the Internet of Things(I...
详细信息
With the increase of energy consumption worldwide in several domains such as industry,education,and transportation,several technologies played an influential role in energy conservation such as the Internet of Things(IoT).In this article,we describe the design and implementation of an IoT-based energy conser-vation smart classroom system that contributes to energy conservation in the edu-cation *** proposed system not only allows the user to access and control IoT devices(e.g.,lights,projectors,and air conditions)in real-time,it also has the capability to aggregate the estimated energy consumption of an IoT device,the smart classroom,and the building based on the energy consumption and cost model that we ***,the proposed model aggregates the estimated energy cost according to the Saudi Electricity Company(SEC)***,the model aggregates in real-time the estimated energy conservation percentage and estimated money-saving percentage compared to data collected when the system wasn't *** feasibility and benefits of our system have been validated on a real-world scenario which is a classroom in the college of computerscience and engineering,Taibah University,Yanbu *** results of the experimental studies are promising in energy conservation and cost-saving when using our proposed system.
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
暂无评论