Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features wit...
详细信息
Internet of Things(IoT)devices work mainly in wireless mediums;requiring different Intrusion Detection System(IDS)kind of solutions to leverage 802.11 header information for intrusion ***-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired *** survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods,IDS techniques,IDS placement strategies,and traffic data analysis *** paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific ***,the Knowledge Discovery in Databases(KDD)Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network(WN).The paper starts with a review of various intrusion detection techniques,data collection methods and placement *** main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless *** detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural *** this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless *** main wireless environments to look into would be Wireless Sensor Networks(WSN),Mobile Ad Hoc Networks(MANET)and IoT as this are the future trends and a lot of attacks have been targeted into these *** it is very crucial to design an IDS specifically to target on the wireless networks.
The current advancement in cloud computing,Artificial Intelligence(AI),and the Internet of Things(IoT)transformed the traditional healthcare system into smart *** services could be enhanced by incorporating key techni...
详细信息
The current advancement in cloud computing,Artificial Intelligence(AI),and the Internet of Things(IoT)transformed the traditional healthcare system into smart *** services could be enhanced by incorporating key techniques like AI and *** convergence of AI and IoT provides distinct opportunities in the medical *** is regarded as a primary cause of death or post-traumatic complication for the ageing ***,earlier detection of older person falls in smart homes is required to improve the survival rate of an individual or provide the necessary ***,the emergence of IoT,AI,smartphones,wearables,and so on making it possible to design fall detection(FD)systems for smart home *** article introduces a new Teamwork Optimization with Deep Learning based Fall Detection for IoT Enabled Smart Healthcare systems(TWODLFDSHS).The TWODL-FDSHS technique’s goal is to detect fall events for a smart healthcare ***,the presented TWODL-FDSHS technique exploits IoT devices for the data collection ***,the TWODLFDSHS technique applies the TWO with Capsule Network(CapsNet)model for feature *** last,a deep random vector functional link network(DRVFLN)with an Adam optimizer is exploited for fall event detection.A wide range of simulations took place to exhibit the enhanced performance of the presentedTWODL-FDSHS *** experimental outcomes stated the enhancements of the TWODL-FDSHS method over other models with increased accuracy of 98.30%on the URFD dataset.
In current research a photovoltaic plant for supplying medium sized enterprises is studied. In the presented manuscript the main advantages of the proposed system and disadvantages of connecting photovoltaic systems t...
详细信息
In a network design, the control plane and the data plane are separated by the architectural concept of software defined networking (SDN). A centralised controller that serves as the only point of control for the whol...
详细信息
This paper proposes a novel joint channel estimation and beamforming scheme for the massive multiple-input-multiple-output(MIMO)frequency-division duplexing(FDD) wireless legitimate surveillance system. With the propo...
详细信息
This paper proposes a novel joint channel estimation and beamforming scheme for the massive multiple-input-multiple-output(MIMO)frequency-division duplexing(FDD) wireless legitimate surveillance system. With the proposed scheme,the monitor with the full duplex capability realizes the proactive eavesdropping of the suspicious link by leveraging the pilot attack approach. Specifically, exploiting the effective eavesdropping rate and the mean square error as performance metrics and setting a total power budget at the training and transmission phases,while guaranteeing the information from suspicious source can be successfully decode, joint pilot design,power allocation and beamforming strategy are formulated as optimization problems for the two objective functions: MSE and effective eavesdropping rate. A closed-form expression of the optimal pilot with the limited length can be obtained via the channel correlation. The optimal power problem at the training phase can be solved by a simple bisection method. Then,based on the obtained imperfect estimated channel,the jamming beamforming at monitor optimization algorithm is proposed by utilizing the convex Semidefinite Programming approach to maximize the effective eavesdropping rate. Numerical results show that the proposed joint pilot design, power allocation and beamforming optimization scheme can improve the surveillance performance of the legitimate monitor as compared to the existing passive eavesdropping and jamming-assisted eavesdropping.
This article presents a stability analysis of a boost DC-DC converter for powering an LED strip. A model of a DC converter is presented and the principle of operation is described. LTSpice software was used to impleme...
详细信息
In the present paper, a harmonic analysis of a Cuk DC-DC converter is realized. A simulation model was implemented in MATLAB/Simulink. The converter is described using differential equations that are represented in st...
详细信息
Deaf people or people facing hearing issues can communicate using sign language(SL),a visual *** works based on rich source language have been proposed;however,the work using poor resource language is still *** other ...
详细信息
Deaf people or people facing hearing issues can communicate using sign language(SL),a visual *** works based on rich source language have been proposed;however,the work using poor resource language is still *** other SLs,the visuals of the Urdu Language are *** study presents a novel approach to translating Urdu sign language(UrSL)using the UrSL-CNN model,a convolutional neural network(CNN)architecture specifically designed for this *** existingworks that primarily focus on languageswith rich resources,this study addresses the challenge of translating a sign language with limited *** conducted experiments using two datasets containing 1500 and 78,000 images,employing a methodology comprising four modules:data collection,pre-processing,categorization,and *** enhance prediction accuracy,each sign image was transformed into a greyscale image and underwent noise *** analysis with machine learning baseline methods(support vectormachine,GaussianNaive Bayes,randomforest,and k-nearest neighbors’algorithm)on the UrSL alphabets dataset demonstrated the superiority of UrSL-CNN,achieving an accuracy of ***,our model exhibited superior performance in Precision,Recall,and F1-score *** work not only contributes to advancing sign language translation but also holds promise for improving communication accessibility for individuals with hearing impairments.
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ...
详细信息
Diagnosing individuals with autism spectrum disorder(ASD)accurately faces great chal-lenges in clinical practice,primarily due to the data's high heterogeneity and limited sample *** tackle this issue,the authors ...
详细信息
Diagnosing individuals with autism spectrum disorder(ASD)accurately faces great chal-lenges in clinical practice,primarily due to the data's high heterogeneity and limited sample *** tackle this issue,the authors constructed a deep graph convolutional network(GCN)based on variable multi‐graph and multimodal data(VMM‐DGCN)for ASD ***,the functional connectivity matrix was constructed to extract primary ***,the authors constructed a variable multi‐graph construction strategy to capture the multi‐scale feature representations of each subject by utilising convolutional filters with varying kernel ***,the authors brought the non‐imaging in-formation into the feature representation at each scale and constructed multiple population graphs based on multimodal data by fully considering the correlation between *** extracting the deeper features of population graphs using the deep GCN(DeepGCN),the authors fused the node features of multiple subgraphs to perform node classification tasks for typical control and ASD *** proposed algorithm was evaluated on the Autism Brain Imaging Data Exchange I(ABIDE I)dataset,achieving an accuracy of 91.62%and an area under the curve value of 95.74%.These results demon-strated its outstanding performance compared to other ASD diagnostic algorithms.
暂无评论