In computer vision,emotion recognition using facial expression images is considered an important research *** learning advances in recent years have aided in attaining improved results in this *** to recent studies,mu...
详细信息
In computer vision,emotion recognition using facial expression images is considered an important research *** learning advances in recent years have aided in attaining improved results in this *** to recent studies,multiple facial expressions may be included in facial photographs representing a particular type of *** is feasible and useful to convert face photos into collections of visual words and carry out global expression *** main contribution of this paper is to propose a facial expression recognitionmodel(FERM)depending on an optimized Support Vector Machine(SVM).To test the performance of the proposed model(FERM),AffectNet is *** uses 1250 emotion-related keywords in six different languages to search three major search engines and get over 1,000,000 facial photos *** FERM is composed of three main phases:(i)the Data preparation phase,(ii)Applying grid search for optimization,and(iii)the categorization *** discriminant analysis(LDA)is used to categorize the data into eight labels(neutral,happy,sad,surprised,fear,disgust,angry,and contempt).Due to using LDA,the performance of categorization via SVM has been obviously *** search is used to find the optimal values for hyperparameters of SVM(C and gamma).The proposed optimized SVM algorithm has achieved an accuracy of 99%and a 98%F1 score.
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
作者:
Gote, Pradnyawant M.Kumar, PraveenVerma, PrateekYesankar, PrajyotPawar, AdeshSaratkar, Saniya
Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Machine Learning Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Data Science Maharashtra Wardha442001 India
The swift progression of wireless communication technologies-specifically from 5G to 6G is an approach that could be the most significant revolutionary leap towards changing connectivity and data transmission forever....
详细信息
Stock price prediction has always been a tough task for all the stakeholders involved. This paper focusses on four different models, namely LSTM, CNN, LSTM-CNN, and Genetic Algorithm-Assisted LSTM-CNN (GA-LSTM-CNN) fo...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
Consistent efforts have been ongoing to improve the friendliness and reliability of informal dialogue systems. However, most research focuses solely on mimicking human-like answers. Therefore, the interlocutors’ awar...
详细信息
This paper explores the concept of entropy of a flow to augment flow statistical features for encrypted DNS tunnelling detection, specifically DNS over HTTPS traffic. To achieve this, the use of flow exporters, namely...
详细信息
Despite software startups often not handlingsensitive data, the implementation of robust security measures is crucial to mitigate significant financial and reputational risks. This study investigates the cost-benefit ...
详细信息
Establishing early warning systems and efficient management of water resources in tidal reaches is crucial for achieving adequate flood protection. In tidal reaches, the river stage interacts non-linearly with tides (...
详细信息
K-means algorithm is one of the well-known unsupervised machine learning algorithms. The algorithm typically finds out distinct non-overlapping clusters in which each point is assigned to a group. The minimum squared ...
详细信息
暂无评论