Results (242)
Search Parameters:
Keyword: NetworksHybrid Feature Selection for Anomaly Detection in IoT Network Intrusion Detection Systems
The rapid growth of Internet of things (IoT) devices have heightened the need for effective Intrusion Detection System (IDS) to combat evolving cyber threats. The IoT networks has the security challenges due to the heterogeneous and high-dimensional nature of network traffic data, redundant features, and class imbalance which hinder detection accuracy and efficiency. Effective IDS…
Read MoreEfficient Pattern Recognition Resource Utilization Neural Network
Neural Networks derives intelligent systems and modern autonomous applications. With the complexity introduced in today’s systems, designing architectures remains open research problem in all fields. Despite many efforts to generalize, the resources required by neural architectures remain challenge. Robots design, Smart cities, IoTs …etc. become the leading industry and driving the fourth industrial revolutions. All…
Read MoreDetection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase
Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…
Read MoreComputationally Efficient Explainable AI Framework for Skin Cancer Detection
Skin cancer stands among some of the fastest growing and fatal malignancies of the world as a result early and accurate diagnosis of skin cancer is essential in order to enhance patient survival and treatment prognosis. Conventional methods of diagnosis including dermoscopy and histopathological examinations are expensive and time consuming also subject to inter-observer error.…
Read MoreStradNet: Automated Structural Adaptation for Efficient Deep Neural Network Design
Deep neural networks (DNNs) have demonstrated remarkable success across a wide range of machine learning tasks. However, determining an effective network architecture, particularly the sizes of the hidden layers, remains a significant challenge and often relies on inefficient trial-and-error experimentation. In this paper, we propose an automated architecture design approach based on structurally adaptive DNNs,…
Read More3D Facial Feature Tracking with Multimodal Depth Fusion
As models based in artificial intelligence increase in sophistication, there is a higher demand for the integration of hardware components to heighten real-world implementations. Both facial feature tracking and shape-from-focus are known techniques in computer vision. However, the combination of these two elements, particularly in a cost-effective configuration, has not been extensively explored. In this…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreAdvancements in Explainable Artificial Intelligence for Enhanced Transparency and Interpretability across Business Applications
This manuscript offers an in-depth analysis of Explainable Artificial Intelligence (XAI), em- phasizing its crucial role in developing transparent and ethically compliant AI systems. It traces AI’s evolution from basic algorithms to complex systems capable of autonomous de- cisions with self-explanation. The paper distinguishes between explainability—making AI decision processes understandable to humans—and interpretability, which provides…
Read MoreEvaluation of Various Deep Learning Models for Short-Term Solar Forecasting in the Arctic using a Distributed Sensor Network
The solar photovoltaic (PV) power generation industry has experienced substantial, ongoing growth over the past decades as a clean, cost-effective energy source. As electric grids use ever-larger proportions of solar PV, the technology’s inherent variability—primarily due to clouds—poses a challenge to maintaining grid stability. This is especially true for geographically dense, electrically isolated grids common…
Read MoreDouble-Enhanced Convolutional Neural Network for Multi-Stage Classification of Alzheimer’s Disease
Being known as an irreversible neurodegenerative disease which has no cure to date, detection and classification of Alzheimer’s disease (AD) in its early stages is significant so that the deterioration process can be slowed down. Generally, AD can be classified into three major stages, ranging from the “normal control” stage with no symptoms shown, the…
Read MoreOptimal Engagement of Residential Battery Storage to Alleviate Grid Upgrades Caused by EVs and Solar Systems
The integration of distributed energy resources has ushered in a host of complex challenges, significantly impacting power quality in distribution networks. This work studies these challenges, exploring issues such as voltage fluctuations and escalating power losses caused by the integration of solar systems and electric vehicle (EV) chargers. We present a robust methodology focused on…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreEnhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing
Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…
Read MoreTowards Real-Time Multi-Class Object Detection and Tracking for the FLS Pattern Cutting Task
The advent of laparoscopic surgery has increased the need to incorporate simulator-based training into traditional training programs to improve resident training and feedback. However, current training methods rely on expert surgeons to evaluate the dexterity of trainees, a time-consuming and subjective process. Through this research, we aim to extend the use of object detection in…
Read MoreSocial Media Text Summarization: A Survey Towards a Transformer-based System Design
Daily life is characterized by a great explosion of abundance of information available on the internet and social media. Smart technology has radically changed our lives, giving a leading role to social media for communication, advertising, information and exchange of opinions. Managing this huge amount of data by humans is an almost impossible task. Adequacy…
Read MoreCondition Assessment of Medium Voltage Assets: A Review
Condition assessment of medium voltage assets is essential to ensure reliability and cost-effective operation of power distribution networks. This article presents a literature review of condition assessment of medium voltage assets related to a distribution system in a non-interconnected zone in Colombia, namely, power transformers, photovoltaic systems, switchgear, lines and cables, and instrument transformers. Advanced…
Read MoreDoubling the Number of Connected Devices in Narrow-band Internet of Things while Maintaining System Performance: An STC-based Approach
Narrow-band Internet of Things (NB-IoT) is a low-power wide-area network (LPWAN) method that was first launched by the 3rd generation partnership project (3GPP) Rel-13 with the purpose of enabling low-cost, low-power, and wide-area cellular connections for the Internet of Things (IoT). As the demand for over-the-air services grows and with the number of linked wireless…
Read MoreForecasting the Weather behind Pa Sak Jolasid Dam using Quantum Machine Learning
This paper extends the idea of creating a Quantum Machine Learning classifier and applying it to real weather data from the weather station behind the Pa Sak Jonlasit Dam. A systematic study of classical features and optimizers with different iterations of parametrized circuits is presented. The study of the weather behind the dam is based…
Read MoreMetaheuristic Optimization Algorithm Performance Comparison for Optimal Allocation of Static Synchronous Compensator
The relevance of static synchronous compensator (STATCOM) controllers in controlling power network parameters is causing them to be included in contemporary networks. But for the intended objectives to be attained, the best device positioning and parameter settings are essential. This work compares the performance of the particle swarm optimization (PSO) and firefly algorithm (FA) in…
Read MoreTransfer and Ensemble Learning in Real-time Accurate Age and Age-group Estimation
Aging is considered to be a complex process in almost every species’ life, which can be studied at a variety of levels of abstraction as well as in different organs. Not surprisingly, biometric characteristics from facial images play a significant role in predicting human’s age. Specifically, automatic age estimation in real-time situation has begun to…
Read MoreInterference-Aware Nodes Deployment of a LoRa-Based Architecture for Smart Agriculture in the Southern Region of Senegal
In Senegal, agriculture has always been seen as the foundation on which the socioeconomic development of the country rests. However, in the rural world, agriculture remains traditional at a time when the challenges of food self-sufficiency to accompany emergence are launched. In the southern part of Senegal commonly called Casamance, the abundance of rain makes…
Read MoreEnsemble Extreme Learning Algorithms for Alzheimer’s Disease Detection
Alzheimer’s disease has proven to be the major cause of dementia in adults, making its early detection an important research goal. We have used Ensemble ELMs (Extreme Learning Models) on the OASIS (Open Access Series of Imaging Studies) data set for Alzheimer’s detection. We have explored various single layered light-weight ELM networks. This is an…
Read MoreHybrid Neural Network Method for Predicting the SOH and RUL of Lithium-Ion Batteries
The use of a battery to power an electrical or electronic system is accompanied by battery management, i.e. a set of measures intended to preserve it for preventative maintenance, thus the cost reduction. This management is generally based on two key parameters, the (remaining useful life) RUL and the (State-of-health) SOH, which relate respectively to…
Read MoreA Self-Adaptive Routing Algorithm for Real-Time Video Transmission in VANETs
Given the strict Quality of Experience (QoE) and Quality of Service (QoS) criteria for video transmission, such as delivery ratio, transmission delay, and mean opinion Score (MOS), video streaming is one of the hardest challenges in Vehicular Ad-Hoc Networks (VANETs). Additionally, VANET attributes, including environmental impediments, fluctuating vehicle density, and highly dynamic topology, have an…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read More
