期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
1
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
SNR and RSSI Based an Optimized Machine Learning Based Indoor Localization Approach:Multistory Round Building Scenario over LoRa Network
2
作者 Muhammad Ayoub Kamal Muhammad Mansoor Alam +1 位作者 Aznida Abu Bakar Sajak Mazliham Mohd Su’ud 《Computers, Materials & Continua》 SCIE EI 2024年第8期1927-1945,共19页
In situations when the precise position of a machine is unknown,localization becomes crucial.This research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine ... In situations when the precise position of a machine is unknown,localization becomes crucial.This research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-based technique.In order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology,this study proposed an optimized machine learning(ML)based algorithm.Received signal strength indicator(RSSI)data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout building.The noise factor is also taken into account,and the signal-to-noise ratio(SNR)value is recorded for every RSSI measurement.This study concludes the examination of reference point accuracy with the modified KNN method(MKNN).MKNN was created to more precisely anticipate the position of the reference point.The findings showed that MKNN outperformed other algorithms in terms of accuracy and complexity. 展开更多
关键词 Indoor localization MKNN LoRa machine learning classification RSSI SNR localization
下载PDF
Artificial Intelligence Based Reliable Load Balancing Framework in Software-Defined Networks
3
作者 Mohammad Riyaz Belgaum Fuead Ali +3 位作者 Zainab Alansari Shahrulniza Musa Muhammad Mansoor Alam M.S.Mazliham 《Computers, Materials & Continua》 SCIE EI 2022年第1期251-266,共16页
Software-defined networking(SDN)plays a critical role in transforming networking from traditional to intelligent networking.The increasing demand for services from cloud users has increased the load on the network.An ... Software-defined networking(SDN)plays a critical role in transforming networking from traditional to intelligent networking.The increasing demand for services from cloud users has increased the load on the network.An efficient system must handle various loads and increasing needs representing the relationships and dependence of businesses on automated measurement systems and guarantee the quality of service(QoS).Themultiple paths from source to destination give a scope to select an optimal path by maintaining an equilibrium of load using some best algorithms.Moreover,the requests need to be transferred to reliable network elements.To address SDN’s current and future challenges,there is a need to know how artificial intelligence(AI)optimization techniques can efficiently balance the load.This study aims to explore two artificial intelligence optimization techniques,namely Ant Colony Optimization(ACO)and Particle Swarm Optimization(PSO),used for load balancing in SDN.Further,we identified that a modification to the existing optimization technique could improve the performance by using a reliable link and node to form the path to reach the target node and improve load balancing.Finally,we propose a conceptual framework for SDN futurology by evaluating node and link reliability,which can balance the load efficiently and improve QoS in SDN. 展开更多
关键词 Ant colony optimization load balancing particle swarm optimization quality of service reliability software-defined networking
下载PDF
Technology Acceptance Factors for Implementing the E-Government Systems in Saudi Arabia
4
作者 Syed Farrukh Amin Amna Binti Saad Adidah Lajis 《Advances in Internet of Things》 2022年第4期125-141,共17页
Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, en... Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, enhances services, boosts efficiency, and saves time. The Government of Saudi Arabia has had various obstacles in serving its populace. Poor service delivery and excessive Government operating costs resulted from this manual service delivery. As a result, the Government launched the E-Government systems, which provide services more quickly. As a result, the report covered Saudi Arabia’s efforts to adopt E-Government, its difficulties, and its objectives to advance the 2030 vision. This study examined the adoption of E-Government systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) in Saudi Arabia. A sample size of 200 was estimated using the Convenience approach and received 58% of the response from employees and end-users of the E-Government systems. Data were analyzed using MS-Excel and SMART PLS for testing the hypothesis and applying the Partial Least Square approach. The results of the hypothesis testing reveal several meaningful relationships, including relative benefits, compatibility, security, management support, performance expectations, perceived Usefulness of E-Government, ease of use by reducing uncertainty to E-Government, and IT infrastructure by reducing language on E-Government adoption. 展开更多
关键词 Information Systems Partial Least Square Unified Theory Acceptance and Use of Technology (UTAUT) E-GOVERNMENT
下载PDF
Outlier Detection Method based on Hybrid Rough - Negative Algorithm
5
作者 Faizah Shaari Azmi Ahmad Zalizah A.Long 《Journal of Mathematics and System Science》 2014年第6期391-397,共7页
This paper discusses on the detection of outliers by hybridizing Rough_Outlier Algorithm with Negative Association Rules. An optimization algorithm named Binary Particle Swarm Optimization is used to improve the compu... This paper discusses on the detection of outliers by hybridizing Rough_Outlier Algorithm with Negative Association Rules. An optimization algorithm named Binary Particle Swarm Optimization is used to improve the computation of Non_Reduct in order to detect outliers.By using Binary PSO algorithm, the rules generated from Rough_Outliers algorithm is optimized, giving significant outliers object detected. The detection ofoutliers process is then enhanced by hybridizing it with Negative Association Rules. Frequent and Infrequent item sets from outlier rules are generated. Results show that the hybrid Rough_Negative algorithm is able to uncover meaningful knowledge of outliers from the frequent and infrequent item sets. These knowledge can then be used by experts in their field of domain for better decision making. 展开更多
关键词 Negative association rules association rules mining OUTLIER non-reduct infrequent item sets frequent item sets rare.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部