Inspired by the visual system of the fruit fly, we had created a generic building block for neuromorphic hardware that is vital for third generation neural networks. This enables time delay to be parametrized in a che...
详细信息
A particular problem in using artificial intelligence techniques in the sensor grid is the high power consumption. Remote sensors are usually limited by the amount of power available, thus our general goal is to minim...
详细信息
A growing range of data sets have been created in recent years; these are used by platforms and software applications and kept in remote access repositories. Datasets are therefore more susceptible to harmful attacks....
详细信息
ISBN:
(数字)9798350365856
ISBN:
(纸本)9798350365863
A growing range of data sets have been created in recent years; these are used by platforms and software applications and kept in remote access repositories. Datasets are therefore more susceptible to harmful attacks. As a result, network security in data transmission is becoming a more important area of study. One well-known method for safeguarding computersystems is the deployment of intrusion detection systems. This study proposes an artificial intelligence based method for data analysis-based anomaly detection. Methods based on machine learning and rules are mixed together. The right rules are created via a genetic algorithm. Relevant features are extracted using principal component analysis with the goal of enhancing performance. The KDD Cup 1999 dataset is used to empirically validate the suggested procedure, satisfying the criterion of using appropriate data. Using the well-known benchmark dataset, the suggested approach is used to identify and examine four different kinds of attacks: Neptune, Ipsweep, Pod, and Teardrop. During the machine learning phase, the data is categorized into categories of attacks and normal behavior after the features set during the training phase are tested. For the purpose of data analysis, the input data is divided into training and testing sets for an artificial neural network. The first 80% of the data are used to train the neural network, and the remaining 20% are used for testing. The estimated accuracy improves with the number of epochs and is higher for training data and lower for validation test data, according to experimental results. Consequently, the trained model can be retained and used to detect discrepancies. The learnt model is used to the system to compute new input parameters that are not used during training or validation.
Technology advancements have transformed medical science and practice, leading to the vast gathering of a wide range of medical data. Medical researchers use artificial intelligence techniques extensively because they...
详细信息
ISBN:
(数字)9798350349832
ISBN:
(纸本)9798350349849
Technology advancements have transformed medical science and practice, leading to the vast gathering of a wide range of medical data. Medical researchers use artificial intelligence techniques extensively because they enable the identification and creation of models of complicated datasets and the interactions between them. This, in turn, enables the successful prediction of future outcomes associated with a specific sickness type. An artificial intelligence-based approach to healthcare data analytics is presented, which leverages data to build a desired model and solve a particular issue. The suggested approach for healthcare data analytics uses a random forest and feedforward artificial neural network with two hidden layers as its basis to get the best model.
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and an...
详细信息
ISBN:
(数字)9798350392166
ISBN:
(纸本)9798350392173
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and analyze data on their own making the best use of available resources and providing creative solutions for challenging issues. The impact of AI on productivity, data analysis, flexibility, and real-time decision- making in a variety of fields is examined in this paper. Focusing on academic settings, the paper considers ethical concerns surrounding AI-generated content. According to a survey, even though many students use ChatGPT for writing and research, worries about academic integrity and plagiarism still exist.
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical *** a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this *** can result when the selection of features is subject to metaheuristics,which can lead to a wide range of ***,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more *** propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of *** the proposed method,the number of features selected is minimized,while classification accuracy is *** test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
We deigned a spiking neural network that computes network weights in the temporal dimension. Such a network can be used for artificial intelligence and deep learning. We demonstrate circuits implementing blocks for bu...
详细信息
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve...
详细信息
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second version of the previously known severe acute respiratory syndrome(SARS)Coronavirus and identified in short as(SARSCoV-2).There have been regular restrictions to avoid the infection spread in all countries,including Saudi *** prediction of new cases of infections is crucial for authorities to get ready for early handling of the virus ***:Analysis and forecasting of epidemic patterns in new SARSCoV-2 positive patients are presented in this research using metaheuristic optimization and long short-term memory(LSTM).The optimization method employed for optimizing the parameters of LSTM is Al-Biruni Earth Radius(BER)***:To evaluate the effectiveness of the proposed methodology,a dataset is collected based on the recorded cases in Saudi Arabia between March 7^(th),2020 and July 13^(th),*** addition,six regression models were included in the conducted experiments to show the effectiveness and superiority of the proposed *** achieved results show that the proposed approach could reduce the mean square error(MSE),mean absolute error(MAE),and R^(2)by 5.92%,3.66%,and 39.44%,respectively,when compared with the six base *** the other hand,a statistical analysis is performed to measure the significance of the proposed ***:The achieved results confirm the effectiveness,superiority,and significance of the proposed approach in predicting the infection cases of COVID-19.
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
暂无评论