Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full sec...
详细信息
Wind speed forecasting is important for wind energy *** the modern era,the increase in energy demand can be managed effectively by fore-casting the wind speed *** main objective of this research is to improve the perf...
详细信息
Wind speed forecasting is important for wind energy *** the modern era,the increase in energy demand can be managed effectively by fore-casting the wind speed *** main objective of this research is to improve the performance of wind speed forecasting by handling uncertainty,the curse of dimensionality,overfitting and non-linearity *** curse of dimensionality and overfitting issues are handled by using Boruta feature *** uncertainty and the non-linearity issues are addressed by using the deep learning based Bi-directional Long Short Term Memory(Bi-LSTM).In this paper,Bi-LSTM with Boruta feature selection named BFS-Bi-LSTM is proposed to improve the performance of wind speed *** model identifies relevant features for wind speed forecasting from the meteorological features using Boruta wrapper feature selection(BFS).Followed by Bi-LSTM predicts the wind speed by considering the wind speed from the past and future time *** proposed BFS-Bi-LSTM model is compared against Multilayer perceptron(MLP),MLP with Boruta(BFS-MLP),Long Short Term Memory(LSTM),LSTM with Boruta(BFS-LSTM)and Bi-LSTM in terms of Root Mean Square Error(RMSE),Mean Absolute Error(MAE),Mean Square Error(MSE)and *** BFS-Bi-LSTM surpassed other models by producing RMSE of 0.784,MAE of 0.530,MSE of 0.615 and R2 of *** experimental result shows that the BFS-Bi-LSTM produced better forecasting results compared to others.
Aiming at the problems of inflexible movement, poor operation efficiency, low space utilization in the storage area and poor compatibility of placed items, intelligent route planning ability and weak intelligent obsta...
详细信息
Research outcomes have been reported to various industrial applications of Artificial Intelligence generated content (AIGC). This paper explores AI assisted creative production of storyboard and game characters in the...
详细信息
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n...
详细信息
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby network ***,current computation offloading studies in the heterogeneous edge environment face multifaceted challenges:Dependencies among computational tasks,resource competition among multiple users,and diverse long-term *** applications typically consist of several functionalities,and one huge category of the applications can be viewed as a series of sequential *** this study,we first proposed a novel multiuser computation offloading framework for long-term sequential ***,we presented a comprehensive analysis of the task offloading process in the framework and formally defined the multiuser sequential task offloading ***,we decoupled the long-term offloading problem into multiple single time slot offloading problems and proposed a novel adaptive method to solve *** further showed the substantial performance advantage of our proposed method on the basis of extensive experiments.
In the rapidly evolving field of cybersecurity, sophisticated cyber threats pose significant challenges to Intrusion Detection Systems (IDS). Machine learning (ML) models have become increasingly integral to IDS, leve...
详细信息
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit...
详细信息
A Multiple moving object detection, tracking, and counting algorithm is mainly designed exclusively suitable for congested areas. The counting system can alleviate the betrayal performance in the crowded areas. Most o...
详细信息
In this paper, we investigate two-step Runge–Kutta methods to solve Volterra integro-differential equations. Two-step Runge–Kutta methods increase the order of convergence in comparing the classical Runge–Kutta met...
详细信息
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and...
详细信息
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and fast and accurate attack detection techniques are *** key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time *** address this issue,we propose an anomaly detection method based on distributed deep *** method uses a bilateral filtering algorithm for sequential sequences to remove noise in the time series,which can maintain the edge of discrete *** use a distributed linear deep learning model to establish a sequential prediction model and adjust the threshold for anomaly detection based on the prediction error of the validation *** method can not only detect abnormal attacks but also locate the sensors that cause *** conducted experiments on the Secure Water Treatment(SWAT)and Water Distribution(WADI)public *** experimental results show that our method is superior to the baseline method in identifying the types of attacks and detecting efficiency.
暂无评论