Online learning has gained traction over recent years, especially since online education has become more widespread. However, it comes with its own set of challenges of which high dropout is still a major one. Identif...
详细信息
Rotor position feedback is required in many industrial and automotive applications, e.g. for field-oriented control of brushless motors. Traditionally, magnetic sensors, resolvers or optical encoders are used to measu...
详细信息
This research presents a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) model developed for malware classification from IoT devices in the SCADA system and for detecting anomalies in the network....
详细信息
This research presents a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) model developed for malware classification from IoT devices in the SCADA system and for detecting anomalies in the network. The developed model identifies complex attacks in the network by taking advantage of the strengths of CNNs that reveal spatial features and LSTMs that detect temporal dependency. CICIoT 2023 is used as the dataset. ADAM optimization algorithm with cross-entropy loss is used to eliminate overfitting and training is performed. Within the scope of the study, the proposed model is compared by applying it with six deep learning architectures (hybrid CNN-LSTM, Non-Local Neural Network (NLNN), Residual Attention Network (RAN), Dual Attention Network (DANet), Transformer-CNN and Attentional CNN). The obtained results show that the proposed CNN-LSTM model outperforms other complex architectures and achieves a high test accuracy of 99.23%. It has demonstrated remarkable performance according to precision, recall and F1 evaluation metrics in detecting distributed denial of service (DDoS) and denial of service (DoS) attacks. The proposed model successfully identifies Mirai botnet variants and fragmentation-based attacks. Although other models, Transformer-CNN (98.81%) and DANet (98.07%), provide high performance, they fall behind the superior temporal modeling capabilities of CNN-LSTM. When the obtained findings are examined, they highlight the relative strengths of various deep learning approaches for IoT security applications. The performances of the implemented deep learning models reached accuracies exceeding 96%, demonstrating the importance of IoT-based SCADA systems against evolving cyber threats. The study revealed the superior successes of deep learning-based approaches for IoT security.
In this study we investigate the heat load patterns in one building using multi-step forecasting model. We combine the Autoregressive models that use multiple eXogenous variables (ARX) with Seasonally adaptable Time o...
详细信息
ISBN:
(数字)9789532901351
ISBN:
(纸本)9798350390797
In this study we investigate the heat load patterns in one building using multi-step forecasting model. We combine the Autoregressive models that use multiple eXogenous variables (ARX) with Seasonally adaptable Time of Week and Climate dependent models (S-TOW-C), to obtain a robust and accurate regression model that we called S-TOW-C-ARX used in time series forecasting. Based on the experiment results, it has been shown that the proposed model is suitable for short term heat load forecasting. The best forecasting performance is achieved in winter term where the prediction values are from 4 to 20 % away from the targets, which are commonly seen as very good values.
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection Systems (IDS), where IDS is one of the important parts of the network that functions to maintain network secur...
详细信息
ISBN:
(数字)9798331539603
ISBN:
(纸本)9798331539610
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection Systems (IDS), where IDS is one of the important parts of the network that functions to maintain network security. With its various capabilities and reputation, Support Vector Machine (SVM) is often applied in various classification cases. However, it has constraints with accuracy and computing time when it comes to data that has large dimensions. Utilizing metaheuristic techniques is one possibility that researchers can use to solve this problem. To overcome this, in this study, we will evaluate the performance of SVM for the IDS case by utilizing the metaheuristic Grey Wolf Optimization (GWO) algorithm. From the experiments with three different iteration models, the best results of the combination of SVM and GWO were found in a model with 10 GWO iterations and 10 populations with an accuracy of 97.47% using 15 features out of 48 original features of the UKM-IDS20 dataset.
This paper investigates the influence of local lag on the reaction forces in a networked virtual maze system incorporating haptic feedback by experiment. In the experiment, participants move a box from the starting po...
详细信息
ISBN:
(数字)9798350353624
ISBN:
(纸本)9798350353631
This paper investigates the influence of local lag on the reaction forces in a networked virtual maze system incorporating haptic feedback by experiment. In the experiment, participants move a box from the starting position to the target point by using Raising method with haptic device. We measure the average operation time and the average of average reaction force for three different moving velocities and three distinct local lags. Experimental results reveal that as the moving velocity increases and the local lag becomes higher, the two measures become larger. Thus, we illustrate that there exists a strong relationship among the average operation time, the average of average reaction force, moving velocity, and local lag, through multiple regression analysis.
This paper presents a new auxiliary circuit for interleaved flyback converters to create soft switching conditions in the element in addition the semiconductor in the converter structure prevents the voltage spike acr...
详细信息
Recent years have witnessed the emerging trend of extensions in modern Integrated Development Environments (IDEs) like Visual Studio Code (VSCode) that significantly enhance developer productivity. Especially, popular...
详细信息
ISBN:
(数字)9798331535100
ISBN:
(纸本)9798331535117
Recent years have witnessed the emerging trend of extensions in modern Integrated Development Environments (IDEs) like Visual Studio Code (VSCode) that significantly enhance developer productivity. Especially, popular AI coding assistants like GitHub Copilot and Tabnine provide conveniences like automated code completion and debugging. While these extensions offer numerous benefits, they may introduce privacy and security concerns to software developers. However, there is no existing work that systematically analyzes the security and privacy concerns, including the risks of data exposure in VSCode extensions. In this paper, we investigate on the security issues of cross-extension interactions in VSCode and shed light on the vulner-abilities caused by data exposure among different extensions. Our study uncovers high-impact security flaws that could allow adversaries to stealthily acquire or manipulate credential-related data (e.g., passwords, API keys, access tokens) from other extensions if not properly handled by extension vendors. To measure their prevalence, we design a novel automated risk detection framework that leverages program analysis and natural language processing techniques to automatically identify potential risks in VSCode extensions. By applying our tool to 27,261 real-world VSCode extensions, we discover that 8.5 % of them (i.e., 2,325 extensions) are exposed to credential-related data leakage through various vectors, such as commands, user input, and configurations. Our study sheds light on the security challenges and flaws of the extension-in-IDE paradigm and provides suggestions and recommendations for improving the security of VSCode extensions and mitigating the risks of data exposure.
In today's fast-paced business environment, making informed decisions is crucial for success. To achieve this, decision-makers are increasingly turning to data-oriented and business intelligence databases. As a re...
详细信息
This research study compares the accuracy of different techniques based on deep learning (DL) for predicting turbulent flows. Different types of Generative Adversarial Networks (GANs) are examined in terms of their ap...
详细信息
暂无评论