Agricultural production vitally contribute to country's economic growth and food needs;however, it depends upon the production and quality of crops. Plants are affected easily due to climate changes and low-qualit...
详细信息
In order to improve the accuracy of landslide prediction, this paper proposes a landslide displacement prediction model based on the random forests and optimized support vector regression. Firstly, Random Forests (RF)...
详细信息
In order to improve the problem of long-term landslide displacement prediction accuracy, this paper applies the Frequency enhanced decomposed transformer (FEDformer) model to landslide displacement prediction, and pro...
详细信息
This paper proposes two frameworks-Interpretive Structural Modelling with Local Interpretable Model-agnostic Explanations (ISM-LIME) and Knowledge Graph with LIME (KG-LIME)-to enhance interpretability in project risk ...
详细信息
Neglecting human values, needs, and priorities in computational systems that support collaborative creativity and innovation may result in diminished user trust and engagement, creativity barriers, and a potential dis...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries...
详细信息
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries in digital platforms to facilitate their ***,IIoT is being used in various industrial fields such as logistics,manufacturing,metals and mining,gas and oil,transportation,aviation,and energy *** is mandatory that various industrial fields require highly reliable security and preventive measures against *** detection is defined as the detection in the network of security threats targeting privacy information and sensitive *** Detection Systems(IDS)have taken an important role in providing security in the field of computer *** of intrusion is completely based on the detection functions of the *** an IIoT network expands,it generates a huge volume of data that needs an IDS to detect intrusions and prevent network *** research works have been done for preventing network *** day,the challenges and risks associated with intrusion prevention are increasing while their solutions are not properly *** this regard,this paper proposes a training process and a wrapper-based feature selection With Direct Linear Discriminant Analysis LDA(WDLDA).The implemented WDLDA results in a rate of detection accuracy(DRA)of 97%and a false positive rate(FPR)of 11%using the Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD)dataset.
Personality-aware recommendation systems have been proven to achieve high accuracy compared to conventional recommendation systems. In addition to that, personality-aware recommendation systems could help alleviate co...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
The investigation aims to evaluate the performance of machine learning techniques, particularly the XGBoost regression method, for stock price prediction with the help of technical indicators. The research targets the...
详细信息
In recent years, the rapid development and widespread applications of non-overlapping community discovery have led to a growing issue of privacy leakage. The core of this problem lies in the community discovery algori...
详细信息
暂无评论