Carbon fiber-reinforced polymer composites (CFRPs) are extensively employed in engineering applications owing to their exceptional strength-to-weight ratio and outstanding fatigue resistance. Nevertheless, when utiliz...
详细信息
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges...
详细信息
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges, such as a high false positive rate, poor accuracy of detection, slow response to threats, and inability to scale well. This paper proposes an efficient and real-time intrusion detection system (IDS) using advanced machine learning techniques within a software-defined networking (SDN) framework specifically tailored for healthcare systems. The proposed architecture implements a Machine Learning (ML) model that combines the SVM and KNN to better identify malicious activities. Full sets of detection and mitigation capabilities are implemented to address different types of traffic in the network with the least interference. Through the different evaluation measures, the efficiency of the proposed model is assured. Network performance is determined by success rate queries, packet losses in each domain path, and the CPU being used by the system. Responsiveness is measured through delay metrics grounded on end-to-end delay, hop-to-hop packet delay, latency rate, and propagation delay. Moreover, model accuracy fidelity is reviewed via precision assessment, alpha (α) affecting the accuracy of the model, and confusion matrix with different techniques with the proposed hybrid SVM-KNN model. Last of all, a comparison of the security of the models in question strengthens the argument in favor of the proposed model. More specifically, flow and network topology diagrams are included to show how integration may be accomplished in linkage or merger with existing healthcare networks. The results also present a 30% overall advancement in detection and mitigation by presenting the hybrid SVM-KNN model to overcome other traditional models. This proposed model shows significant improvements not less than 20-30% improvement in CPU use, 30-50% reduction in end-to-end delay,
There is an urgent need to rapidly reduce greenhouse gas (GHG) emissions and, although human activity is a primary driver of emissions, a knowledge gap remains in terms of the key individual and collective drivers of ...
详细信息
This paper proposes a novel hybrid model, STGCN-LSTM, to forecast Olympic medal distributions by integrating the spatio-temporal relationships among countries and the long-term dependencies of national performance. Th...
详细信息
This paper studies the damage characteristics of underwater explosions on typical underwater structures with array charges, using both experimental and numerical methods. A small-scale explosion experiment is conducte...
详细信息
A numerical method that integrates the Lattice Boltzmann Method (LBM) with the Smoothed Point Interpolation Method (S-PIM) is developed to model a two-dimensional self-propelled fishlike body swimming in three distinc...
详细信息
In recent years, due to the improvement in ship protection capabilities, near-field underwater explosions no longer pose fatal damage to ships. Since stiffened plates are typical structures in ships, studying the impa...
详细信息
The author asserts that knowledge-based technologies will revolutionize software development and that expert systems will help in several areas of the software life cycle. These are identified and reasons are given fo...
详细信息
ISBN:
(纸本)0818607386
The author asserts that knowledge-based technologies will revolutionize software development and that expert systems will help in several areas of the software life cycle. These are identified and reasons are given for the claim that productivity will be increased. It is believed that the main benefit will be the result of the underlying technology, which will cause profound changes in the process of developing software, changing the life cycle greatly. What these changes are, and why they will occur, are described. The confusion concerning the 'software prototype' is discussed.
A description is given of the adaptive diagnostic system (ADS) presently being developed as part of the US Navy integrated diagnostic support system (IDSS). The ADS is currently in the development and demonstration ph...
详细信息
A description is given of the adaptive diagnostic system (ADS) presently being developed as part of the US Navy integrated diagnostic support system (IDSS). The ADS is currently in the development and demonstration phase of the program. It is designed to assist the fault isolation process by selecting and interpreting tests in the light of its knowledge and data about a device and by updating the data after a fault isolation session is over. The ADS brings many different classes of data and knowledge to bear on the fault isolation problem. These include precomputed fault trees, design topology, logical parameters, historical records, and production rules. So-called 'layers of intelligence' are applied to faults, beginning with the simplest approach and moving to more complicated approaches if needed. Historical records are taken advantage of in two ways: identification of common failures is used to bias the system's behavior;and historical records are examined for evidence of an inconsistency between the ADS models of the device and the behavior of the device.
Recent advances in microcomputer technology have made it possible to develop artificial intelligence applications on personal computers. This paper describes the KES expert system development tool, and discusses the r...
详细信息
ISBN:
(纸本)0818605464
Recent advances in microcomputer technology have made it possible to develop artificial intelligence applications on personal computers. This paper describes the KES expert system development tool, and discusses the recent conversion of KES to the format of an IBM-PC personal computer.
暂无评论