Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati...
详细信息
The paper presents an analysis of the problem of time series forecasting. The two most common forecasting methods, ARIMA and LSTM, are considered. Since these models independently predict linear and, accordingly, nonl...
详细信息
Nowadays, gas leak detection equipment in the workplace, schools, and homes plays a vital role in protecting public safety. Liquified Petroleum Gas (LPG) leaks are one of the most serious issues in the kitchen because...
详细信息
Agriculture is under tremendous pressure to produce more productivity with fewer resources as a result of the expanding global population. Decision-making along the entire supply chain needs to be improved considering...
详细信息
One way to save time and resources in the human recruitment and hiring process is to post open job positions on the Internet, but the overload of applications creates challenges for hiring managers and companies to se...
详细信息
Counterfeit drugs are fake medicines that are potentially harmful for health. Safeguarding the integrity of pharmaceutical distribution plays a crucial role in preventing the circulation of counterfeit drugs. Traditio...
详细信息
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet...
详细信息
Cyberattacks are developing gradually sophisticated,requiring effective intrusion detection systems(IDSs)for monitoring computer resources and creating reports on anomalous or suspicious *** the popularity of Internet of Things(IoT)technology,the security of IoT networks is developing a vital *** of the huge number and varied kinds of IoT devices,it can be challenging task for protecting the IoT framework utilizing a typical *** typical IDSs have their restrictions once executed to IoT networks because of resource constraints and ***,this paper presents a new Blockchain Assisted Intrusion Detection System using Differential Flower Pollination with Deep Learning(BAIDS-DFPDL)model in IoT *** presented BAIDS-DFPDLmodelmainly focuses on the identification and classification of intrusions in the IoT *** accomplish this,the presented BAIDS-DFPDL model follows blockchain(BC)technology for effective and secure data transmission among the ***,the presented BAIDSDFPDLmodel designs Differential Flower Pollination based feature selection(DFPFS)technique to elect ***,sailfish optimization(SFO)with Restricted Boltzmann Machine(RBM)model is applied for effectual recognition of *** simulation results on benchmark dataset exhibit the enhanced performance of the BAIDS-DFPDL model over other models on the recognition of intrusions.
Solar energy is one of the most abundant sources of renewable energy in Indonesia. Solar energy is now typically harnessed using solar panels, but the low efficiency of photovoltaic cells requires the development of o...
详细信息
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q...
详细信息
Technological advancements are increasingly evident across various sectors, including automobiles, industry, and healthcare. In precision agriculture, significant progress has been made, with AgroTICs and Smart Agricu...
详细信息
暂无评论