There has been a growing excitement that implicit graph generative models could be used to design or discover new molecules for medicine or material design. Because these molecules have not been discovered, they natur...
详细信息
Object detection in surveillance systems leverages advanced deep learning techniques to enhance security measures through real-time analysis of dynamic video feeds. This project integrates the YOLOv5 model for detecti...
详细信息
This paper presents the methodologies implemented for the Automatic Speech Recognition and Machine Translation for the language pairs Bhojpuri-Hindi and Marathi-Hindi for the Dialectal and Low-Resource shared task pro...
详细信息
The application of Agile methodologies to large-scale, safety-critical cyber-physical systems (LS/SC/CPS) has shown significant interest over the last 5 years. Although there has been limited research into each of the...
详细信息
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approxim...
详细信息
ISBN:
(纸本)9791188428120
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approximately 5.3 billion people are connected to the internet, underscoring its widespread coverage and indispensability in our daily lives. This expansive coverage enables a myriad of services, including communication, e-banking, e-commerce, online social security access, medical reporting, education, entertainment, weather information, traffic monitoring, online surveys, and more. However, this open platform also exposes vulnerabilities to malicious users who actively seek to exploit weaknesses in the virtual domain, aiming to gain credentials, financial benefits, or reveal critical information through the use of malware. This constant threat poses a serious challenge in safeguarding sensitive information in cyberspace. To address this challenge, we propose the use of ensemble and deep neural network (DNN) based machine learning (ML) techniques to detect malicious intent packets before they can infiltrate or compromise systems and applications. Attackers employ various tactics to evade existing security systems, such as antivirus or intrusion detection systems, necessitating a robust defense mechanism. Our approach involves implementing an ensemble, a collection of diverse classifiers capable of capturing different attack patterns and better generalizing from highly relevant features, thus enhancing protection against a variety of attacks compared to a single classifier. Given the highly unbalanced dataset, the ensemble classifier effectively addresses this condition, and oversampling is also employed to minimize bias toward the majority class. To prevent overfitting, we utilize Random Forest (RF) and the dropout technique in the DNN. Furthermore, we introduce a DNN to assess its ability to recognize complex attack patterns and variations compared to the ens
With the increasing speed of advance of both Internet of Things (IoT) and the demands of utilizing IoT devices in different locations with high compatibility, fog computing has been foreseen as a sustainable solution....
详细信息
Efficient traffic management in urban environments is essential for minimizing congestion and ensuring smooth transportation flow. 6G network is expected to offer faster data speeds, lower latency, and enhanced connec...
详细信息
Image deblurring techniques that uses deep learning have shown great potential but due to low generalizability, noise immunity and the correlation among different pixels is not addressed in detail that results in unwa...
详细信息
The Self-Attention mechanism, which lies at the core of Transformer architectures, plays a vital role in capturing long-range dependencies. However, its high computational complexity and significant memory requirement...
详细信息
This study analyzes air pollution in Asian cities using the Global Air Pollution Data, consisting of 6,196 entries from 31 countries. Our primary goal is to identify pollution patterns through multivariate analysis an...
详细信息
暂无评论