Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based...
详细信息
Given the abundance of cyber-attacks in wireless communications, machine learning can be essential in identifying intrusions. Ensemble learning has been proven to be a well-known technique for boosting performance and...
Given the abundance of cyber-attacks in wireless communications, machine learning can be essential in identifying intrusions. Ensemble learning has been proven to be a well-known technique for boosting performance and reducing variance. In this paper, we propose a simple ensemble supervised machine learning system, which consists of three classifiers: one-dimensional Convolutional Neural Network, FT-Transformer, and XGBoost, to categorize network traffic as benign or malicious. To find a suitable ensemble method for these classifiers, we implemented three ensemble strategies to integrate these classifiers and assessed their performance. The experimental results demonstrate that our proposed ensemble model achieves strong performance in intrusion detection, as measured by various classification metrics. When evaluated on four benchmark datasets, the model consistently delivers high Accuracy, Precision, Recall, and F1-score. The research showcases the viability of various algorithms, the power of the self-attention model, and the significance of ensemble approaches in strengthening cyber-defense strategies and understanding modern cyber threats.
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormo...
详细信息
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormous increase in these reviews has raised the need for an automated system to analyze these reviews to rate these *** Analysis(SA)is a technique that performs such decision *** research targets the ranking and rating through sentiment analysis of these reviews,on different *** a case study,Songs are opted to design and test the decision *** aspects of songs namely music,lyrics,song,voice and video are *** the reason,reviews of 20 songs are scraped from YouTube,pre-processed and formed a *** machine learning algorithms—Naïve Bayes(NB),Gradient Boost Tree,Logistic Regression LR,K-Nearest Neighbors(KNN)and Artificial Neural Network(ANN)are *** performed the best with 74.99%*** are validated using K-Fold.
Efficient end-of-life products disassembly is crucial in the remanufacturing process. However, hazardous and repetitive disassembly tasks raise labor costs and decrease safety and efficiency. This work proposes an inn...
详细信息
The increasing adoption of IoT devices in healthcare necessitates the development of lightweight and fast intrusion detection systems (IDS). This paper proposes a weighted ensemble ML IDS with parallelized batch learn...
详细信息
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based...
详细信息
There is increasing attention on remanufacturing, with the primary focus in the industry on recovering reusable products to generate profit. In the process of optimizing remanufacturing, addressing the balance issue i...
详细信息
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers...
详细信息
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled information Technology service *** cloud computing environment extracts the execution details of services and systems from end-users and ***,through the system’s virtualization accomplished using resource pooling,cloud computing resources become more *** attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this *** the help of multi-agents,we attempt to represent Open-Identity(ID)design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the *** research aims to determine how authentication and authorization services were provided in an agreeable and preventive *** on attack-oriented threat model security,the evaluation *** considering security for both authentication and authorization systems,possible security threats are analyzed by the proposed security systems.
In this work, a new susceptible–exposed–infectious–recovered (SEIR) compartmental model is proposed which has additional media influence for precise quantization of the coronavirus disease 2019 (COVID-19). In the p...
详细信息
Blockchain technology is one of the key technological breakthroughs of the last *** has the ability to revolutionize numerous aspects of society,including financial systems,healthcare,e-government and many *** such ar...
详细信息
Blockchain technology is one of the key technological breakthroughs of the last *** has the ability to revolutionize numerous aspects of society,including financial systems,healthcare,e-government and many *** such area that is able to reap the benefits of blockchain technology is the real estate *** many other industries,real estate faces major administrative problems such as high transaction fees,a lack of transparency,fraud and the effects of a middleman including undue influence and *** enables supporting technologies to overcome the obstacles inherent within the real estate investment *** technologies include smart contracts,immutable record management and time-stamped *** utilize these key properties of blockchain technology in our work by proposing a system that has the ability to record real estate transactions in a private blockchain,using smart *** immutability of the blockchain ledger and transactions can provide a safe space for the real estate *** technology can also assist the authentication process by hastening background *** digital keys are provided to parties that are involved in a contract,thus minimizing the risk of *** also discuss the rationale behind the advantages of using a blockchain in this manner,and how we selected the consensus mechanism for our proposed system.
暂无评论