This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images r...
详细信息
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images reflecting a highly challenging and unconstraint *** methodology for building the dataset consists of four core phases;that include acquisition of videos,extraction of frames,localization of face regions,and cropping and resizing of detected face *** raw images in the dataset consist of a total of 4613 frames obtained fromvideo *** processed images in the dataset consist of the face regions of 250 persons extracted from raw data images to ensure the authenticity of the presented *** dataset further consists of 8 images corresponding to each of the 250 subjects(persons)for a total of 2000 *** portrays a highly unconstrained and challenging environment with human faces of varying sizes and pixel quality(resolution).Since the face regions in video sequences are severely degraded due to various unavoidable factors,it can be used as a benchmark to test and evaluate face detection and recognition algorithms for research *** have also gathered and displayed records of the presence of subjects who appear in presented frames;in a temporal *** can also be used as a temporal benchmark for tracking,finding persons,activity monitoring,and crowd counting in large crowd scenarios.
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
This paper outlines the merging of Explainable Artificial Intelligence (XAI) with Open Radio Access Network (O-RAN) and space communication systems. The usage of AI drives decision-making in critical domains of teleco...
详细信息
ISBN:
(纸本)9798331530747
This paper outlines the merging of Explainable Artificial Intelligence (XAI) with Open Radio Access Network (O-RAN) and space communication systems. The usage of AI drives decision-making in critical domains of telecommunications and space explorations requires transparency and interpretability. However, traditional AI models often operate as 'black boxes,' making it difficult to understand their decision-making processes. This lack of explainability poses significant risks, including misinterpretation of signals, undetected anomalies, and erroneous decision-making, which can compromise the integrity of communication systems. Specifically, the challenges include accurately distinguishing between legitimate signals and attacks in anti-jamming scenarios, understanding the behaviour of complex models like LSTM in traffic prediction, and ensuring the reliability of telemetry data despite errors and noise. Integration of XAI techniques within O-RAN architecture and space communication protocols can ensure trust, reliability and safety in AI-enabled systems. This paper investigates the opportunities and challenges of incorporating XAI in O-RAN and space communications. Additionally, it presents the implications of XAI, the need for interpretability in autonomous spacecraft operations, anomaly detection and decision support for mission-critical tasks. By bridging the gap in AI transparency and advanced communication technology, this paper aims to present a detailed analysis of implemented AI and Machine Learning (ML) in the telecommunication domain. It also presents the challenges currently faced in the intersection of XAI and communication. Use cases of XAI in the domain of Open Radio Access Network and Space Communications in light of LIME and SHAP techniques were presented to give a hypothetical modelling for future experimentation to provide local and global interpretation and explanations for the currently employed AI/ML models in the respective domains. Overall, this
Rumors regarding epidemic diseases such as COVID 19,medicines and treatments,diagnostic methods and public emergencies can have harmful impacts on health and political,social and other aspects of people’s lives,espec...
详细信息
Rumors regarding epidemic diseases such as COVID 19,medicines and treatments,diagnostic methods and public emergencies can have harmful impacts on health and political,social and other aspects of people’s lives,especially during emergency situations and health *** huge amounts of content being posted to social media every second during these situations,it becomes very difficult to detect fake news(rumors)that poses threats to the stability and sustainability of the healthcare sector.A rumor is defined as a statement for which truthfulness has not been *** COVID 19,people found difficulty in obtaining the most truthful news easily because of the huge amount of unverified information on social *** methods have been applied for detecting rumors and tracking their sources for COVID 19-related ***,very few studies have been conducted for this purpose for the Arabic language,which has unique ***,this paper proposes a comprehensive approach which includes two phases:detection and *** the detection phase of the study carried out,several standalone and ensemble machine learning methods were applied on the Arcov-19 dataset.A new detection model was used which combined two models:The Genetic Algorithm Based Support Vector Machine(that works on users’and tweets’features)and the stacking ensemble method(that works on tweets’texts).In the tracking phase,several similarity-based techniques were used to obtain the top 1%of similar tweets to a target tweet/post,which helped to find the source of the *** experiments showed interesting results in terms of accuracy,precision,recall and F1-Score for rumor detection(the accuracy reached 92.63%),and showed interesting findings in the tracking phase,in terms of ROUGE L precision,recall and F1-Score for similarity techniques.
While Spatio-Temporal Graph Convolutional Networks (STGCNs) are an effective method for traffic speed fore-casting, their training and inference tend to be time-consuming. In this paper, we aim to refine these network...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
In this paper, we aim to reduce the number of nodes from Graph Neural Networks (GNNs), thereby simplifying models and reducing computational costs. GNNs are highly effective for various tasks, such as prediction, clas...
详细信息
Low-Rate Denial of Service (LDoS) attacks, an emerging breed of DoS attacks, present a formidable challenge in terms of their detectability. Within the realm of network security, these attacks cast a substantial shado...
详细信息
Hyperparameter optimization (HPO) is paragon to maximize performance when designing machine learning models. Among different HPO methods, Genetic Algorithm (GA) based optimization is considered effective because it al...
详细信息
This research introduces real-time monitoring and localizing product stock using the First-In-First-Out (FIFO) method with radio frequency identification (RFID) pressure sensing tags. The proposed FIFO system has RFID...
详细信息
暂无评论