In an era marked by the proliferation of interconnected devices, the Internet of Things (IoT) has emerged as a revolutionary technological paradigm. IoT networks encompass a vast array of devices, from smart appliance...
详细信息
The cold-start problem is a major issue in recommender systems that becomes a challenge for e-commerce companies when processing large amounts of data. Several strategies have been proposed to overcome the cold-start ...
详细信息
The increasing population, climate fluctuations, soil erosion, limited water resources, and concerns about food security highlight the need for effective and sustainable approaches to food production. Aquaponics repre...
详细信息
This research addresses the communication challenges faced by the deaf and mute community, leveraging advanced technology to enhance augmentative and alternative communication (AAC). In light of the limitations of exi...
详细信息
This study shows the comparative analysis of classification machine learning algorithms performed on the Bot-IoT dataset. The Bot-IoT dataset is an omnipresent dataset that contains network traffic data collected from...
详细信息
ISBN:
(纸本)9798350313987
This study shows the comparative analysis of classification machine learning algorithms performed on the Bot-IoT dataset. The Bot-IoT dataset is an omnipresent dataset that contains network traffic data collected from Internet of Things (IoT) devices. The dataset provides useful insights into the characteristics of botnet traffic and can be used to create an environment where there are effective detection and mitigation strategies. This research analysis evaluates several well-known classification algorithms on the Bot-IoT dataset. The algorithms considered in this study include, Decision Trees (DT), Random Forest (RF), Support Vector Machine (SVM), and Naive Bayes (NB). The evaluation process consists of several steps. First, the obtained dataset is preprocessed by handling the left out values, normalizing features, and splitting it into testing and training sets. Then, each classification algorithm is trained based on the training set and the hyper parameters are fine-tuned by using the cross -validation techniques. After training, the performance of each algorithm is evaluated on the testing set using different factors such as accuracy, precision, recall and F1 score. Finally, the research results provide insights on the advantages and disadvantages of different classification algorithms for enabling botnet detection using the Bot-IoT dataset. This study compares the performance of each algorithm based on the accuracy, F1- Score, recall and other evaluation metrics, which allows to identify the most effective algorithm. Additionally, this study analyses the computational complexity and training time of each algorithm to assess their practical feasibility in realtime scenarios. The resultant observation can be valuable for researchers working on IoT security, specifically in the area of botnet detection and prevention. By understanding the performance characteristics of different classification algorithms, stakeholders can make informed decisions when selecting an
Device identification is a crucial aspect of securing networks, particularly in the context of the Internet of Things (IoT), where a vast variety of devices are interconnected. Recently, there has been significant res...
详细信息
Due to the complex track environment, the use of only one stage for track component identification is prone to inaccurate component positioning, resulting in misjudgment of the target coordinate system and other probl...
详细信息
Parkinson's disease is a neurological syndrome that manifests slowly and gradually, making it difficult to diagnose at an early stage. Voice alterations can be used as a detectable marker of early detection. The S...
详细信息
Static random access memories (SRAMs) are commonly used in In-Memory Computing (IMC) architectures that perform neural network related computations directly in the memory unit, overcoming the data transfer constrains ...
详细信息
This paper presents a distributed and synchronised multilingual audio container for video streams. The system utilises a distributed architecture to separate audio and video streams, allowing for the independent manip...
详细信息
暂无评论