Data’s role is pivotal in the era of internet technologies, but unstructured data poses comprehension challenges. Data visualizations like charts have emerged as crucial tools for condensing complex information. Clas...
详细信息
作者:
Davies, Antony N.SERC
Sustainable Environment Research Centre Faculty of Computing Engineering and Science University of South Wales United Kingdom
Davies talks about spectroscopic data set. As originally delivered the spectrometer was capable of generating some of the best data sets people had ever been able to measure. Excellent signal-to-noise ratios and extre...
Davies talks about spectroscopic data set. As originally delivered the spectrometer was capable of generating some of the best data sets people had ever been able to measure. Excellent signal-to-noise ratios and extremely stable calibrations. The associated computer hardware was somewhat behind the state-of-the-art, but this was quite normal due to the long development times for the instrument hardware. And so, in the hands of many expert, and some less expert, scientists, this wonderful spectrometer gave birth to many spectroscopic data sets--reinforcing theories and dispelling some myths. Over its lifespan serving as an excellent measurement platform allowing many modifications to the original basic equipment. So, while our data was young there were no problems. All the measurement parameters were stored with the data set so we could check the instrument had been set up correctly.
Nighttime detection of pedestrians brings important problems such as low light conditions, limitations of sensors, and environmental noise. To tackle this problem, in this study, we propose a novel visual-radar data f...
详细信息
Civilization has always relied on geological materials and it would not exist as we know it without the use of minerals. For the foreseeable future, minerals will remain fundamentally important commodities. As technol...
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe...
详细信息
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designed with security because they are resource constrained ***,having an accurate IoT security system to detect security attacks is *** Detection Systems(IDSs)using machine learning and deep learning techniques can detect security attacks *** paper develops an IDS architecture based on Convolutional Neural Network(CNN)and Long Short-Term Memory(LSTM)deep learning *** implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that cate-gorizes the network traffic into normal and attacks *** this work,interpolation data preprocessing is used to compute the missing ***,the imbalanced data problem is solved using a synthetic data generation *** experiments have been implemented to compare the performance results of the proposed model(CNN+LSTM)with a basic model(CNN only)using both balanced and imbalanced ***,with some state-of-the-art machine learning classifiers(Decision Tree(DT)and Random Forest(RF))using both balanced and imbalanced *** results proved the impact of the balancing *** proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy(92.10%)compared with the basic CNN model(89.90%)and the machine learning(DT 88.57%and RF 90.85%)***,comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
作者:
Krishna, Siram ChaitanyaReddy, Painti NagiKirubanantham, P.School of Computing
SRM Institute of Science and Technology Kattankulathur Department of Computing Technologies Chennai India School of Computing
College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Faculty of Engineering and Technology Department of Computing Technologies Chennai India
Today, the day-to-day generation of such a large amount of content on social media and other websites makes it impossible to maintain each image manually, so the need for automatically identifying sensitive images and...
详细信息
The availability of time series streaming data has increased dramatically in recent years. Since the last decade, there has been a growing interest in learning from realtime data. While extracting significant informat...
详细信息
Arabic script is exhibited in a cursive style, which is a departure from the norm in many common languages, and the shapes of letters are contingent on their positions within words. The form of the first letter is inf...
详细信息
Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System(ITS)and reduces road *** major obstacles in automatic detection of tiny vehicles are due to occlus...
详细信息
Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System(ITS)and reduces road *** major obstacles in automatic detection of tiny vehicles are due to occlusion,environmental conditions,illumination,view angles and variation in size of *** research centers on tiny and partially occluded vehicle detection and identification in challenging scene specifically in crowed *** this paper we present comprehensive methodology of tiny vehicle detection using Deep Neural Networks(DNN)namely *** DNN disregards objects that are small in size 5 pixels and more false positives likely to happen in crowded *** there are two categories of deep learning models single-step and two-step.A single forward pass model is the one in which detection is performed directly to possible location over dense sampling,wherein two-step models incorporated by Region proposals followed by object *** in this research scrutinize one-step State of the art(SOTA)model CenteNet as proposed recently with three different feature extractor ResNet-50,HourGlass-104 and ResNet-101 one by *** train our model on challenging KITTI dataset which outperforms in comparison with SOTA single-step technique MSSD300∗which depicts performance improvement by 20.2%mAPandSMOKEby with 13.2%mAP *** of CenterNet can be justified through the huge improved *** performance of our model is evaluated on KITTI(Karlsruhe Institute of Technology and Toyota Technological Institute)benchmark dataset with different backbones such as ResNet-50 gives 62.3%mAP ResNet-10182.5%mAP,last but not the least HourGlass-104 outperforms with 98.2%mAP CenterNet-HourGlass-104 achieved high mAP among above mentioned feature *** also compare our model with other SOTA techniques.
暂无评论