Advanced Search
Displaying 1-10 on page 1 of 35. Per Page  

Articles / Online

  • A Hybrid Algorithm Based on PSO and GA for Feature Selection
  • Abstract One of the main problems of machine learning and data mining is to develop a basic model with a few features, to reduce the algorithms involved in classification’s computational complexity. In this paper, the collection of features has an essential importance in the classification process to be able minimize computational time, which decreases data size and increases the precision and effectiveness of specific machine learning activities. Due to its superiority to conventional optimization methods, several metaheuristics have been used to resolve FS issues. This is why hybrid metaheuristics help increase the search and convergence rate of the critical algorithms. A…
  • More
  •   Views:222       Downloads:210        Download PDF
  • Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT
  • Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an…
  • More
  •   Views:226       Downloads:217        Download PDF
  • Computational Intelligent Techniques To Detect DDOS Attacks : A Survey
  • Abstract The Internet is often targeted by the Distributed Denial of Service (DDOS) Attacks that deliberately utilize resources and bandwidth to prohibit access to potential users. The attack possibility is that the packets are filled massively. A DOS attack is launched by a single source, while a DDOS attack is originated from numerous resources. DDoS attacks are not capable of stealing website user’s information. The prime motive of the DDoS attacks is to devastate the website resources. Distributed Denial of Service (DDoS) attacks are disruptive to internet access on the Network. The attitude of the customer to get fast and reliable…
  • More
  •   Views:246       Downloads:214        Download PDF
  • Pedestrian Crossing Detection Based on HOG and SVM
  • Abstract In recent years, pedestrian detection is a hot research topic in the field of computer vision and artificial intelligence, it is widely used in the field of security and pedestrian analysis. However, due to a large amount of calculation in the traditional pedestrian detection technology, the speed of many systems for pedestrian recognition is very limited. But in some restricted areas, such as construction hazardous areas, real-time detection of pedestrians and cross-border behaviors is required. To more conveniently and efficiently detect whether there are pedestrians in the restricted area and cross-border behavior, this paper proposes a pedestrian cross-border detection method…
  • More
  •   Views:186       Downloads:177        Download PDF
  • Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano
  • Abstract In recent years, with the rapid development of the drone industry, drones have been widely used in many fields such as aerial photography, plant protection, performance, and monitoring. To effectively control the unauthorized flight of drones, using GPS spoofing attacks to interfere with the flight of drones is a relatively simple and highly feasible attack method. However, the current method uses ground equipment to carry out spoofing attacks. The attack range is limited and the flexibility is not high. Based on the existing methods, this paper proposes a multi-UAV coordinated GPS spoofing scheme based on YOLO Nano, which can launch…
  • More
  •   Views:223       Downloads:216        Download PDF
  • IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption
  • Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports…
  • More
  •   Views:341       Downloads:338        Download PDF
  • Single-Choice Aided Marking System Research Based on Back Propagation Neural Network
  • Abstract In the field of educational examination, automatic marking technology plays an essential role in improving the efficiency of marking and liberating the labor force. At present, the implementation of the policy of expanding erolments has caused a serious decline in the teacher-student ratio in colleges and universities. The traditional marking system based on Optical Mark Reader technology can no longer meet the requirements of liberating the labor force of teachers in small and medium-sized examinations. With the development of image processing and artificial neural network technology, the recognition of handwritten character in the field of pattern recognition has attracted the…
  • More
  •   Views:321       Downloads:299        Download PDF
  • A Survey on Security Threats and Solutions of Bitcoin
  • Abstract Bitcoin is known as the first decentralized digital currency around the world. It uses blockchain technology to store transaction data in a distributed public ledger, is a distributed ledger that removes third-party trust institutions. Since its invention, bitcoin has achieved great success, has a market value of about $200 billion. However, while bitcoin has brought a wide and far-reaching impact in the financial field, it has also exposed some security problems, such as selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS attacks, and so on. This paper gives a comprehensive overview of various attack scenarios that the bitcoin…
  • More
  •   Views:457       Downloads:423        Download PDF
  • An LSTM-Based Malware Detection Using Transfer Learning
  • Abstract Mobile malware occupies a considerable proportion of cyberattacks. With the update of mobile device operating systems and the development of software technology, more and more new malware keep appearing. The emergence of new malware makes the identification accuracy of existing methods lower and lower. There is an urgent need for more effective malware detection models. In this paper, we propose a new approach to mobile malware detection that is able to detect newly-emerged malware instances. Firstly, we build and train the LSTM-based model on original benign and malware samples investigated by both static and dynamic analysis techniques. Then, we build…
  • More
  •   Views:419       Downloads:429        Download PDF
  • The Technical Design and Implementation of Cross-Platform Industrial Product Order System
  • Abstract According to some data in the Industrial Purchasing Trends report released by China in 2017, we can see that e-commerce purchasing channels have ranked first among all industrial products purchasing channels in China compared with European and American countries. In addition, in the whole industrial product purchasing market, we can also see that both manufacturers and suppliers are making active e-commerce transformation, and some other Internet giants are also actively entering the industrial product e-commerce industry. But at present, the revenue of all kinds of subjects is still a lot of room for improvement compared to the United States industrial…
  • More
  •   Views:392       Downloads:353        Download PDF
Displaying 1-10 on page 1 of 35. Per Page