This study is built upon a behavior-based framework for real-time attention evaluation of higher education learners in e-reading. Significant challenges in AI model developments for learning analytics have been 1) def...
详细信息
A cutting-edge online marketplace that uses blockchain technology to transform how we purchase and sell goods and services is known as a blockchain- powered e-commerce platform. This platform uses a decentralized netw...
详细信息
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly *** this,with its distributed and dynamic nature and shortcomings in virtualization deployme...
详细信息
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly *** this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security *** Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various *** attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection *** the purpose of the study is to improve detection *** Selection(FS)is *** the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy *** this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive *** classification is not compromised by using an ABOA *** design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat ***’s parameters can be finetuned to detect DDoS attacks better using specially built *** reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this *** it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing *** the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches.
This study presents case studies in finance, mainly stock trading. The paperwork from a portfolio data mining effort and data obtained directly from the Indonesian Stock Exchange serves as the basis for the case study...
详细信息
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h...
详细信息
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world *** proposed model combines Convolutional Neural Networks(CNN),Bidirectional Long Short-Term Memory(BLSTM),Gated Recurrent Units(GRU),and Attention mechanisms into a cohesive *** integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT *** evaluated our model using the RT-IoT2022 dataset,which includes various devices,standard operations,and simulated *** research’s significance lies in the comprehensive evaluation metrics,including Cohen Kappa and Matthews Correlation Coefficient(MCC),which underscore the model’s reliability and predictive *** model surpassed traditional machine learning algorithms and the state-of-the-art,achieving over 99.6%precision,recall,F1-score,False Positive Rate(FPR),Detection Time,and accuracy,effectively identifying specific threats such as Message Queuing Telemetry Transport(MQTT)Publish,Denial of Service Synchronize network packet crafting tool(DOS SYN Hping),and Network Mapper Operating System Detection(NMAP OS DETECTION).The experimental analysis reveals a significant improvement over existing detection systems,significantly enhancing IoT security *** our experimental analysis,we have demonstrated a remarkable enhancement in comparison to existing detection systems,which significantly strength-ens the security standards of *** model effectively addresses the need for advanced,dependable,and adaptable security solutions,serving as a symbol of the power of deep learning in strengthening IoT ecosystems amidst the constantly evolving cyber threat *** achievemen
Air pollution has been on the rise for quite a while now and with it is the increasing number of cases involving respiratory diseases. These respiratory diseases range from the mild ones to the most severe ones. There...
详细信息
Accurately predicting crop yield is essential for optimizing agricultural practices and ensuring food security. However, existing approaches often struggle to capture the complex interactions between various environme...
详细信息
Food choice motives(i.e.,mood,health,natural content,convenience,sensory appeal,price,familiarities,ethical concerns,and weight control)have an important role in transforming the current food system to ensure the heal...
详细信息
Food choice motives(i.e.,mood,health,natural content,convenience,sensory appeal,price,familiarities,ethical concerns,and weight control)have an important role in transforming the current food system to ensure the healthiness of people and the sustainability of the *** from several domains have presented several models addressing issues influencing food choice over the ***,a multidisciplinary approach is required to better understand how various aspects interact with one another during the decision-making *** this paper,four Deep Learning(DL)models and one Machine Learning(ML)model are utilized to predict the weight in pounds based on food *** Long Short-Term Memory(LSTM)model,stacked-LSTM model,Conventional Neural Network(CNN)model,and CNN-LSTM model are the used deep learning *** the applied ML model is the K-Nearest Neighbor(KNN)*** efficiency of the proposed model was determined based on the error rate obtained from the experimental *** findings indicated that Mean Absolute Error(MAE)is 0.0087,the Mean Square Error(MSE)is 0.00011,the Median Absolute Error(MedAE)is 0.006,the Root Mean Square Error(RMSE)is 0.011,and the Mean Absolute Percentage Error(MAPE)is ***,the results demonstrated that the stacked LSTM achieved improved results compared with the LSTM,CNN,CNN-LSTM,and KNN regressor.
Large binary images are used in many modern applications of image processing. For instance, they serve as inputs or target masks for training machine learning (ML) models in computer vision and image segmentation. Sto...
详细信息
暂无评论