This article introduces a novel variant of the generalized linear exponential(GLE)distribution,known as the sine generalized linear exponential(SGLE)*** SGLE distribution utilizes the sine transformation to enhance it...
详细信息
This article introduces a novel variant of the generalized linear exponential(GLE)distribution,known as the sine generalized linear exponential(SGLE)*** SGLE distribution utilizes the sine transformation to enhance its *** updated distribution is very adaptable and may be efficiently used in the modeling of survival data and dependability *** suggested model incorporates a hazard rate function(HRF)that may display a rising,J-shaped,or bathtub form,depending on its unique *** model includes many well-known lifespan distributions as separate *** suggested model is accompanied with a range of statistical *** model parameters are examined using the techniques of maximum likelihood and Bayesian estimation using progressively censored *** order to evaluate the effectiveness of these techniques,we provide a set of simulated data for testing *** relevance of the newly presented model is shown via two real-world dataset applications,highlighting its superiority over other respected similar models.
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the *** detection using machine learning(ML)with flow-based features has...
详细信息
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the *** detection using machine learning(ML)with flow-based features has been extensively studied in the *** flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious ***,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network *** purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and *** propose BotSward,a graph-based bot detection system that is based on *** apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the *** efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,*** is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art *** proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%.
The Monte Carlo method, proposed by Dell’Amico and Filippone, estimates a password’s rank within a probabilistic model for password generation, i.e., it determines the password’s strength according to this model. W...
详细信息
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management *** advanced technology,such as Intellig...
详细信息
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management *** advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer *** provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road ***,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological *** may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS *** this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between ***-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed *** results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks.
What causes object detection in video to be less accurate than it is in still images?Because some video frames have degraded in appearance from fast movement,out-of-focus camera shots,and changes in *** reasons have m...
详细信息
What causes object detection in video to be less accurate than it is in still images?Because some video frames have degraded in appearance from fast movement,out-of-focus camera shots,and changes in *** reasons have made video object detection(VID)a growing area of research in recent *** object detection can be used for various healthcare applications,such as detecting and tracking tumors in medical imaging,monitoring the movement of patients in hospitals and long-term care facilities,and analyzing videos of surgeries to improve technique and ***,it can be used in telemedicine to help diagnose and monitor patients *** VID techniques are based on recurrent neural networks or optical flow for feature aggregation to produce reliable features which can be used for *** of those methods aggregate features on the full-sequence level or from nearby *** create feature maps,existing VID techniques frequently use Convolutional Neural Networks(CNNs)as the backbone *** the other hand,Vision Transformers have outperformed CNNs in various vision tasks,including object detection in still images and image *** propose in this research to use Swin-Transformer,a state-of-the-art Vision Transformer,as an alternative to CNN-based backbone networks for object detection in *** proposed architecture enhances the accuracy of existing VID *** ImageNet VID and EPIC KITCHENS datasets are used to evaluate the suggested *** have demonstrated that our proposed method is efficient by achieving 84.3%mean average precision(mAP)on ImageNet VID using less memory in comparison to other leading VID *** source code is available on the website https://***/amaharek/SwinVid.
We study the impact of forbidding short cycles to the edge density of k-planar graphs;a k-planar graph is one that can be drawn in the plane with at most k crossings per edge. Specifically, we consider three settings,...
详细信息
Human activity recognition is essential for comprehending behavior patterns and forecasting the physical movements of humans, which has ramifications for domains including healthcare, sports, and security. The objecti...
详细信息
Background: Cloud computing refers to the computing capacities of remote computers, where the user has considerable computing power without having to own power units. The probability of failures, which can occur durin...
详细信息
The advent of decentralized energy markets has revolutionized the traditional energy sector by empowering consumers to trade energy directly with each other. Blockchain, on the other hand, has emerged as a secure and ...
详细信息
With the rise of Arabic digital content, effective summarization methods are essential. Current Arabic text summarization systems face challenges such as language complexity and vocabulary limitations. We introduce an...
详细信息
暂无评论