Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
The article presents a study of the syntactic compatibility of verbs of motion in the Vakh dialect of the Khanty language. The study was conducted with the help of the tools of the platform for documentation of the Ur...
详细信息
The article presents a study of the syntactic compatibility of verbs of motion in the Vakh dialect of the Khanty language. The study was conducted with the help of the tools of the platform for documentation of the Uralic languages Lingvodoc. The purpose of the article is to describe patterns of syntactic valency that Vakh Khanty verbs of motion have.
The article is devoted to the development of means for recognition of the emotions of the speaker, based on the neural network analysis of fixed fragments of the voice signal. The possibility of improving recognition ...
详细信息
With the increasing number of IoT devices, there is a growing need for bandwidth to support their communication. Unfortunately, there is a shortage of available bandwidth due to preallocated bands for various services...
With the increasing number of IoT devices, there is a growing need for bandwidth to support their communication. Unfortunately, there is a shortage of available bandwidth due to preallocated bands for various services. To address this issue, Cognitive Internet of Things (CR-IoT) enables devices to optimize their efficiency and enhance their communication capabilities by intelligently accessing available bandwidth. This is achieved through the use of soft sensing metrics, where devices continuously monitor the RF environment and transmit data opportunistically in overlay mode if a free channel is detected, or in underlay mode if not. In this paper, a soft sensing metric based hybrid transmission framework is proposed for CR-IoT devices to meet the data rate requirement for the smart city applications. The efficacy of this approach is demonstrated through simulation results.
Silicone rubber (SIR) has been widely used in the insulation of cable accessories due to its excellent performance. In this paper, pure SIR and nano Al2O3/SIR composites are thermally aged for 0-80 days at 200°C....
详细信息
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune system. Individuals constantly need blood and its derivatives to save their lives and improve their health through medical treatments and surgical operations. Liver diseases are one of the diseases that affects the health of individuals and requires blood to continue living. These diseases cause significant damage to people's health, and early diagnosis plays a crucial role in saving lives. In this paper, machine learning algorithms (support vector machine and random forest) are involved in detecting liver diseases and determining whether donors are suitable to donate blood from blood values. This paper is applied research that found that the performance measures of the random forest algorithm achieved excellent performance in identifying suitable people to donate blood.
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comprehensive overview of data poisoning including attack techniques, adversary incentives, impacts on security and reliability, detection methods, defenses, and key research gaps. We examine label flipping, instance injection, backdoors, and other attack categories that enable malicious outcomes ranging from IP theft to accidents in autonomous systems. Promising detection approaches include statistical tests, robust learning, and forensics. However, significant challenges remain in translating academic defenses like adversarial training and sanitization into practical tools ready for operational use. With safety and trustworthiness at stake, more research on benchmarking evaluations, adaptive attacks, fundamental tradeoffs, and real-world deployment of defenses is urgently needed. Understanding vulnerabilities and developing resilient machine learning pipelines will only grow in importance as data integrity is fundamental to developing safe artificial intelligence.
Resolving regional carbon budgets is critical for informing land-based mitigation policy. For nine regions covering nearly the whole globe, we collected inventory estimates of carbon-stock changes complemented by sate...
详细信息
Resolving regional carbon budgets is critical for informing land-based mitigation policy. For nine regions covering nearly the whole globe, we collected inventory estimates of carbon-stock changes complemented by satellite estimates of biomass changes where inventory data are missing. The net land–atmospheric carbon exchange(NEE) was calculated by taking the sum of the carbon-stock change and lateral carbon fluxes from crop and wood trade, and riverine-carbon export to the ocean. Summing up NEE from all regions, we obtained a global ‘bottom-up’ NEE for net land anthropogenic CO2uptake of –2.2 ± 0.6 Pg C yr-1consistent with the independent top-down NEE from the global atmospheric carbon budget during 2000–2009. This estimate is so far the most comprehensive global bottom-up carbon budget accounting, which set up an important milestone for global carbon-cycle studies. By decomposing NEE into component fluxes, we found that global soil heterotrophic respiration amounts to a source of CO2of 39 Pg C yr-1with an interquartile of 33–46 Pg C yr-1—a much smaller portion of net primary productivity than previously reported.
暂无评论