The advent of 5G networks signifies a major breakthrough in mobile communications, providing better data rates, low latency, and improved connectivity. Efficient resource allocation within 5G networks is paramount to ...
详细信息
Modern compilers often offer a variety of warning flags, which developers can enable to get feedback on code that, while syntactically correct, may be problematic. In the case of C++, one example of such 'correct ...
详细信息
Neural Style Transfer (NST) has emerged as a powerful technique for artistic image synthesis by fusing the base image with style source. In this study, we present a comparative analysis of NST using popular convolutio...
详细信息
Dhaka, known for its status as one of the world's most densely populated areas, grapples with numerous challenges associated with urbanization and safety. This study identifies accident-prone zones within the Dhak...
详细信息
Assessing landslide susceptibility is vital in mitigating natural disasters, particularly in zones with active tectonics. This paper will discuss a novel approach based on a CNN architecture in a U -Net designed to as...
详细信息
In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research emphasizes the critical need to safeguard organizational assets...
详细信息
Gait, the pattern of walking, has been extensively studied and various methods have been developed to use it as a biometric for individual recognition. Despite this, the potential to identify individuals through runni...
详细信息
CMOS technology evolution enhances integrated circuits (ICs) performance characteristics at the cost of their increased susceptibility to radiation and thus to the occurrence of single-event upsets (SEUs) that may lea...
详细信息
Wireless Sensor Networks (WSNs) have advanced quickly due to the fast expansion of wireless networks. Yet, because of their ease of use and versatility, security concerns have grown. This means that conducting researc...
详细信息
ISBN:
(纸本)9798350348460
Wireless Sensor Networks (WSNs) have advanced quickly due to the fast expansion of wireless networks. Yet, because of their ease of use and versatility, security concerns have grown. This means that conducting research on intrusion protection in WSNs is now essential. Denial of Service (DoS) assaults are among the most common types of network attacks. They are dangerous because they take down the target network in order to accomplish their goal. Within WSNs, where devices function with limited resources, a denial-of-service attack has the potential to be disastrous. This research suggests a novel solution for WSNs, which are susceptible to assaults because to their devices' little storage capacity. To find abnormalities in DoS traffic within WSNs, the technique combines a Deep Convolutional Neural Network (DCNN) with Principal Component Analysis (PCA). By detecting and reducing the effects of DoS assaults, and by utilising the complementary capabilities of PCA and DCNN in this particular situation, the goal is to improve the security of WSNs. Compared with other traditional DL architectures, the proposed model has a more simplified structure and better feature extraction capabilities. This special combination gives it the power to quickly identify anomalous network activity in WSNs devices, especially those with limited storage. Because of its lightweight design, the suggested model addresses the inherent resource limits and guarantees optimal performance in the context of WSNs. A variety of assessment measures, such as confusion matrices, different classification metrics, and Receiver Operating Characteristic (ROC) curves, are used to verify the effectiveness of the suggested model. These metrics are used to evaluate the model's categorization performance in a rigorous manner. Extensive experimental comparisons reveal that the small size of the proposed model outperforms other popular models for anomalous traffic detection with regards to classification performance
We present a novel approach for efficient task scheduling on hierarchical fog nodes, catering to real-time (RT) and non-real-time (NRT) tasks with varying sizes and deadline constraints. Leveraging machine learning (M...
详细信息
暂无评论