Body fitness monitoring applications are using mobile sensors to identify human activities. Human activity identification is a challenging task because of the wide availability of human activities. This paper proposes...
详细信息
This paper presents a hybrid search based retrieval-augmented generation (RAG) system in the domain of history, in Serbian language. The system was implemented in Python programming language, and is based on Google BE...
详细信息
Due to an increase in the load of network, load balancing service, i.e., a service that gives an equal volume of each task assignment to each of the servers in data centers, it is usually performed by the specialized ...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security *** study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)*** proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained *** methodology was validated on two benchmark datasets,CICIDS2017 and *** rules were evaluated against conventional Security Information and Event Management systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation *** results demonstrate that xAI-derived rules consistently outperform traditional static ***,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.
Wireless sensor network is a rapidly growing and challenging field as they are constrained by energy utilization, computation cost, network capacity, and security. Hence conventional network security schemes cannot be...
详细信息
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques...
详细信息
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques for mining big data to extract the useful and hidden patterns that exist in ***-based clustering techniques have gained significant attention owing to the fact that it helps to effectively recognize complex patterns in spatial *** data clustering is a trivial process owing to the increasing quantity of data which can be solved by the use of Map Reduce *** this motivation,this paper presents an efficient Map Reduce based hybrid density based clustering and classification algorithm for big data analytics(MR-HDBCC).The proposed MR-HDBCC technique is executed on Map Reduce tool for handling the big *** addition,the MR-HDBCC technique involves three distinct processes namely pre-processing,clustering,and *** proposed model utilizes the Density-Based Spatial Clustering of Applications with Noise(DBSCAN)techni-que which is capable of detecting random shapes and diverse clusters with noisy *** improving the performance of the DBSCAN technique,a hybrid model using cockroach swarm optimization(CSO)algorithm is developed for the exploration of the search space and determine the optimal parameters for density based ***,bidirectional gated recurrent neural network(BGRNN)is employed for the classification of big *** experimental validation of the proposed MR-HDBCC technique takes place using the benchmark dataset and the simulation outcomes demonstrate the promising performance of the proposed model interms of different measures.
The Integrated Sensing and Communication (ISAC) system merged with Reconfigurable Intelligent Surface (RIS) has recently received much attention. This paper proposes an intelligent metaheuristic version of Enhanced Ar...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get c...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the *** these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From
This article proposes three-level (TL) buck-boost direct ac-ac converters based on switching-cell configuration with coupled magnetics. The proposed converters use only six active switches and can produce noninverting...
详细信息
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over t...
详细信息
ISBN:
(纸本)9798350352931
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over the last decade, the number of these computing systems - including desktops, laptops, smartphones, and the Internet of Things (IoT) - has skyrocketed. Among them, cell phones are practically integral to modern life. The popularity of web-based assaults has skyrocketed with the exponential growth in the number of individuals using the Internet. These web-based assaults are increasingly being combatted by security corporations. Unfortunately, new forms of these assaults are appearing all the time, making it hard for older security measures to stay up. Artificial intelligence (AI) is a source of optimism in the current cybersecurity landscape, offering a potential solution to the ever-changing digital dangers. The fast development of AI over the last decade has given rise to this optimism, because it is now impacting the expansion of every industry. With AI bringing so many advantages in every field, online security is one sector that just cannot afford to ignore it. This planned effort's work represents an advance in that direction. Critical online security issues have been the focus of this proposed work's study, which aims to address these issues using AI. Web security issues for desktop and mobile devices have been addressed in the proposed work. The planned work's contributions to online security are as follows: The 'MalCrawler' web crawler is a targeted tool for finding and exploring the web. This crawler makes it easy to gather websites, particularly ones that are harmful. It does a better job of collecting dangerous websites than a typical crawler. Additionally, it is built to circumvent the evasion strategies used by rogue websites. The crawler's ability to gather webpages - particularly dangerous ones - in order to provide datasets for ML-based an
暂无评论