With the rapid development of social media, sentiment analysis from multimodal posts has garnered significant attention in recent years. However, the substantial size of these models impedes their deployment on resour...
详细信息
There is considerable interest in the use of fractional programming (FP) for the communication system design because many problems in this area are fractionally structured. Notably, max-FP and min-FP are not interchan...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection Systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in...
详细信息
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in the fog computing environment is a pivotal *** different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing ***,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog *** Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,*** boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat *** sequence generated by this map is used to transform the coordinates of the fog *** improved range of the proposed map is depicted using bifurcation *** quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate *** also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical *** experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature.
Mobile prices play a pivotal role in determining their popularity amongst consumers and their competitive standing within the market. As customers consider their budget while evaluating a mobile phone's specificat...
详细信息
Businesses are transitioning towards using cloud services for many of their networking and system needs. However, designing and implementing these cloud services can be costly for business owners. In this paper, we pr...
详细信息
Stereo point matching is a critical and fundamental problem in 3D vision. Numerous algorithms have been proposed to solve this problem. Since images obtained from 3D to 2D projection of a 3D scene lose depth informati...
详细信息
Cardiovascular disease has emerged as a very critical and intricate condition on a global scale. Healthcare practitioners have long faced substantial challenges in predicting and identifying heart disease. Medical and...
详细信息
This work investigates using Convolutional Neural Networks (CNN) and VGGNet architecture, for realtime emotion detection. Raw data from the FER-2013 dataset is transformed from CSV format into organized image director...
详细信息
A major challenge with the multi-ratio Fractional Program (FP) is that the existing methods for the maximization problem typically do not work for the minimization case. We propose a novel technique called inverse qua...
暂无评论