This research investigates the classification of dried moringa leaves using machine-learning techniques, focusing on texture and color features. The study addresses the challenge of overlapping classes A and B by merg...
详细信息
Research on the visual system and its development is not only crucial for understanding how we see and interpret the environment from basic visual processing to complex perception but also aids in the development of t...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering *** proposed version employs a network-based reputation system to select the best and most secure path to a *** achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation *** minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation ***,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast *** proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other *** the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing *** paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different ***,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me...
详细信息
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating secur-ity *** paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble *** proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of *** proposed model is applied to the KDEF dataset using 10-fold *** improvements are made to the proposed ***,the VGG16 model is applied to the seven common ***,the system usability is enhanced by analyzing and selecting only the four common and easy-to-use ***,the horizontal ensemble technique is applied to enhance the emotion recognition accuracy and minimize the error during authen-tication ***,the Horizontal Ensemble Best N-Losses(HEBNL)is applied using challenge-response emotion to improve the authentication effi-ciency and minimize the computational *** successive improvements implemented on the proposed model led to an improvement in the accuracy from 92.1%to 99.27%.
Recent advances in generative models have revolutionized the technology employed for image synthesis quite significantly, and two paradigms—GANs and diffusion-based models—are leading the pack of innovation. This pa...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS *** this paper,a Fuzzy C-Means(FCM)clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by ***,a time series dataset is created in the time domain using AEFS *** AEFS-based weather is evaluated according to the time-series Membership Degree(MD)changes obtained by inputting this dataset into the ***,thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF ***,a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space ***,the rationality and reliability of the proposed method are verified by combining radar charts and expert *** results confirm that this method accurately characterizes the weather attributes and changes in the AEFS,and a negative distance-MD correlation is obtained for the first *** detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
作者:
Brodniansky, JurajLang, JánInstitute of Informatics
Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak Technical University in Bratislava Bratislava Slovakia
Attention management in software development proves to be a highly relevant issue. It offers various ways of managing the user’s attention using visual perception of the work environment. Awareness of the workplace p...
详细信息
Traditional rule-based IntrusionDetection systems(IDS)are commonly employed owing to their simple design and ability to detect known ***,as dynamic network traffic and a new degree of threats exist in IoT environments...
详细信息
Traditional rule-based IntrusionDetection systems(IDS)are commonly employed owing to their simple design and ability to detect known ***,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection *** this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify *** ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the *** fuzzy logic sets produce adaptive detection rules by reducing data ***,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical *** extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional *** the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion *** research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats.
In the context of Intelligent Transportation systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep...
详细信息
暂无评论