期刊文献+
共找到367,024篇文章
< 1 2 250 >
每页显示 20 50 100
An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces
1
作者 Sheetal Sharma Kamali Gupta +2 位作者 DeepaliGupta Shalli Rani Gaurav Dhiman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2029-2059,共31页
The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness... The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things. 展开更多
关键词 ERROR fault detection techniques sensor faults OUTLIERS Internet of Things
下载PDF
Research Progress on Detection Techniques of Fungicide Residues in Chinese Chives
2
作者 Xiuying CHEN Zhe MENG +5 位作者 Chen DING Huihui LIU Yancheng ZHOU Jinlu LI Yanhua YAN Lei WANG 《Agricultural Biotechnology》 2024年第1期43-48,共6页
Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized... Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives. 展开更多
关键词 Chinese chive Pesticide residues FUNGICIDE detection technique
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
3
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
4
作者 Singamaneni Krishnapriya Sukhvinder Singh 《Computers, Materials & Continua》 SCIE EI 2024年第8期2675-2719,共45页
The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advan... The increase in number of people using the Internet leads to increased cyberattack opportunities.Advanced Persistent Threats,or APTs,are among the most dangerous targeted cyberattacks.APT attacks utilize various advanced tools and techniques for attacking targets with specific goals.Even countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted attack.APT is a sophisticated attack that involves multiple stages and specific strategies.Besides,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security system.However,APTs are generally implemented in multiple stages.If one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack failure.The detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing challenges.This survey paper will provide knowledge about APT attacks and their essential steps.This follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the work.Data used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack. 展开更多
关键词 Advanced persistent threats APT cyber security intrusion detection cyber attacks
下载PDF
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
5
作者 Noor Ullah Bacha Songfeng Lu +3 位作者 Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi 《Computers, Materials & Continua》 SCIE EI 2024年第10期707-748,共42页
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with ... Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive data.Traditional detection methods often fail to keep pace with the evolving sophistication of cyber threats.This paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack detection.Our approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in performance.It demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant loads.Furthermore,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time applications.Designed for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current defenses.This innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats. 展开更多
关键词 Cross-site scripting machine learning XSS detection stacking ensemble learning hybrid learning
下载PDF
LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques
6
作者 Shanjita Akter Prome Md Rafiqul Islam +4 位作者 MdKowsar Hossain Sakib David Asirvatham Neethiahnanthan Ari Ragavan Cesar Sanin Edward Szczerbicki 《Computers, Materials & Continua》 SCIE EI 2024年第11期2845-2871,共27页
Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie ... Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions.The human face is a rich source of data that offers trustworthy markers of deception.The deception or lie detection systems are non-intrusive,cost-effective,and mobile by identifying facial expressions.Over the last decade,numerous studies have been conducted on deception detection using several advanced techniques.Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception.So,it could be challenging to spot trends,practical approaches,gaps,and chances for contribution.However,there are still a lot of opportunities for innovative deception detection methods.Therefore,we used a variety of machine learning(ML)and deep learning(DL)approaches to experiment with this work.This research aims to do the following:(i)review and analyze the current lie detection(LD)systems;(ii)create a dataset;(iii)use several ML and DL techniques to identify lying;and(iv)create a hybrid model known as LDNet.By combining layers from Vgg16 and DeneseNet121,LDNet was developed and offered the best accuracy(99.50%)of all the models.Our developed hybrid model is a great addition that significantly advances the study of LD.The findings from this research endeavor are expected to advance our understanding of the effectiveness of ML and DL techniques in LD.Furthermore,it has significant practical applications in diverse domains such as security,law enforcement,border control,organizations,and investigation cases where accurate lie detection is paramount. 展开更多
关键词 Artificial intelligence deception/lie detection deep learning facial expression machine learning
下载PDF
Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans
7
作者 Nahed Tawfik Heba M.Emara +3 位作者 Walid El-Shafai Naglaa F.Soliman Abeer D.Algarni Fathi EAbd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第10期271-307,共37页
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a... Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates. 展开更多
关键词 Lung cancer detection CLAHE algorithm optimization deep learning CLASSIFICATION feature extraction healthcare applications
下载PDF
Detection of Knowledge on Social Media Using Data Mining Techniques
8
作者 Aseel Abdullah Alolayan Ahmad A. Alhamed 《Open Journal of Applied Sciences》 2024年第2期472-482,共11页
In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), s... In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), such as extracting information related to people’s behaviors and interactions to analyze feelings or understand the behavior of users or groups, and many others. This extracted knowledge has a very important role in decision-making, creating and improving marketing objectives and competitive advantage, monitoring events, whether political or economic, and development in all fields. Therefore, to extract this knowledge, we need to analyze the vast amount of data found within social media using the most popular data mining techniques and applications related to social media sites. 展开更多
关键词 Data Mining KNOWLEDGE Data Mining techniques Social Media
下载PDF
Deadlock Detection:Background,Techniques,and Future Improvements
9
作者 LU Jiachen NIU Zhi +2 位作者 CHEN Li DONG Luming SHEN Taoli 《ZTE Communications》 2024年第2期71-79,共9页
Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehens... Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehensive analysis of the various deadlock detection techniques,including static and dynamic approaches.We discuss the future improvements associated with deadlock detection and provide a comparative evaluation of these techniques in terms of their accuracy,complexity,and scalability.Furthermore,we outline potential future research directions to improve deadlock detection mechanisms and enhance system performance. 展开更多
关键词 deadlock detection static analysis dynamic analysis
下载PDF
Advancements in Photovoltaic Panel Fault Detection Techniques
10
作者 Junyao Zheng 《Journal of Materials Science and Chemical Engineering》 2024年第6期1-11,共11页
This paper examines the progression and advancements in fault detection techniques for photovoltaic (PV) panels, a target for optimizing the efficiency and longevity of solar energy systems. As the adoption of PV tech... This paper examines the progression and advancements in fault detection techniques for photovoltaic (PV) panels, a target for optimizing the efficiency and longevity of solar energy systems. As the adoption of PV technology grows, the need for effective fault detection strategies becomes increasingly paramount to maximize energy output and minimize operational downtimes of solar power systems. These approaches include the use of machine learning and deep learning methodologies to be able to detect the identified faults in PV technology. Here, we delve into how machine learning models, specifically kernel-based extreme learning machines and support vector machines, trained on current-voltage characteristic (I-V curve) data, provide information on fault identification. We explore deep learning approaches by taking models like EfficientNet-B0, which looks at infrared images of solar panels to detect subtle defects not visible to the human eye. We highlight the utilization of advanced image processing techniques and algorithms to exploit aerial imagery data, from Unmanned Aerial Vehicles (UAVs), for inspecting large solar installations. Some other techniques like DeepLabV3 , Feature Pyramid Networks (FPN), and U-Net will be detailed as such tools enable effective segmentation and anomaly detection in aerial panel images. Finally, we discuss implications of these technologies on labor costs, fault detection precision, and sustainability of PV installations. 展开更多
关键词 Photovoltaic Panels Fault detection Deep Learning Image Processing
下载PDF
基于改进Detection Transformer的棉花幼苗与杂草检测模型研究
11
作者 冯向萍 杜晨 +3 位作者 李永可 张世豪 舒芹 赵昀杰 《计算机与数字工程》 2024年第7期2176-2182,共7页
基于深度学习的目标检测技术在棉花幼苗与杂草检测领域已取得一定进展。论文提出了基于改进Detection Transformer的棉花幼苗与杂草检测模型,以提高杂草目标检测的准确率和效率。首先,引入了可变形注意力模块替代原始模型中的Transforme... 基于深度学习的目标检测技术在棉花幼苗与杂草检测领域已取得一定进展。论文提出了基于改进Detection Transformer的棉花幼苗与杂草检测模型,以提高杂草目标检测的准确率和效率。首先,引入了可变形注意力模块替代原始模型中的Transformer注意力模块,提高模型对特征图目标形变的处理能力。提出新的降噪训练机制,解决了二分图匹配不稳定问题。提出混合查询选择策略,提高解码器对目标类别和位置信息的利用效率。使用Swin Transformer作为网络主干,提高模型特征提取能力。通过对比原网络,论文提出的模型方法在训练过程中表现出更快的收敛速度,并且在准确率方面提高了6.7%。 展开更多
关键词 目标检测 detection Transformer 棉花幼苗 杂草检测
下载PDF
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
12
作者 Matthew Abu John Ibukunoluwa Bankole +3 位作者 Oluwatayo Ajayi-Moses Tofunmi Ijila Timilehin Jeje Patil Lalit 《American Journal of Plant Sciences》 2023年第11期1260-1295,共36页
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow... Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being. 展开更多
关键词 Disease Management detection techniques Advanced detection SUSTAINABILITY Science-Policy Food Security
下载PDF
A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques 被引量:2
13
作者 Anitha Thangasamy Bose Sundan Logeswari Govindaraj 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2553-2567,共15页
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,etc.Although Cloud Computing provides various advanta... The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,etc.Although Cloud Computing provides various advantages for users,it remains vulnerable to many types of attacks that attract cyber criminals.Distributed Denial of Service(DDoS)is the most common type of attack on cloud computing.Consequently,Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks.Since DDoS attacks have become increasingly widespread,it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish various types of DDoS attacks.Further,the monitoring pattern of traffic changes and accurate detection of DDoS attacks are most important and urgent.In this research work,DDoS attack detection methods based on deep belief network feature extraction and Hybrid Long Short-Term Memory(LSTM)model have been proposed with NSL-KDD dataset.In Hybrid LSTM method,the Particle Swarm Optimization(PSO)technique,which is combined to optimize the weights of the LSTM neural network,reduces the prediction error.This deep belief network method is used to extract the features of IP packets,and it identifies DDoS attacks based on PSO-LSTM model.Moreover,it accurately predicts normal network traffic and detects anomalies resulting from DDoS attacks.The proposed PSO-LSTM architecture outperforms the classification techniques including standard Support Vector Machine(SVM)and LSTM in terms of attack detection performance along with the results of the measurement of accuracy,recall,f-measure,precision. 展开更多
关键词 Cloud computing distributed denial of service particle swarm optimization long short-term memory attack detection
下载PDF
A Review of Machine Learning Techniques in Cyberbullying Detection 被引量:1
14
作者 Daniyar Sultan Batyrkhan Omarov +5 位作者 Zhazira Kozhamkulova Gulnur Kazbekova Laura Alimzhanova Aigul Dautbayeva Yernar Zholdassov Rustam Abdrakhmanov 《Computers, Materials & Continua》 SCIE EI 2023年第3期5625-5640,共16页
Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social me... Automatic identification of cyberbullying is a problem that is gaining traction,especially in the Machine Learning areas.Not only is it complicated,but it has also become a pressing necessity,considering how social media has become an integral part of adolescents’lives and how serious the impacts of cyberbullying and online harassment can be,particularly among teenagers.This paper contains a systematic literature review of modern strategies,machine learning methods,and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet.We undertake an in-depth review of 13 papers from four scientific databases.The article provides an overview of scientific literature to analyze the problem of cyberbullying detection from the point of view of machine learning and natural language processing.In this review,we consider a cyberbullying detection framework on social media platforms,which includes data collection,data processing,feature selection,feature extraction,and the application ofmachine learning to classify whether texts contain cyberbullying or not.This article seeks to guide future research on this topic toward a more consistent perspective with the phenomenon’s description and depiction,allowing future solutions to be more practical and effective. 展开更多
关键词 CYBERBULLYING hate speech digital drama online harassment detection classification machine learning NLP
下载PDF
Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset 被引量:1
15
作者 Mohammed Zakariah Salman A.AlQahtani +1 位作者 Abdulaziz M.Alawwad Abdullilah A.Alotaibi 《Computers, Materials & Continua》 SCIE EI 2023年第12期4025-4054,共30页
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastru... Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic.By consuming time and resources,intrusive traffic hampers the efficient operation of network infrastructure.An effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network activity.Finding unusual internet traffic has become a severe security risk for intelligent devices.These systems are negatively impacted by several attacks,which are slowing computation.In addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried data.The NSL-KDD dataset shall be utilized for both training and testing.In this paper,we present a custom ANN model architecture using the Keras open-source software package.The specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network data.The performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and ANN.It is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all evaluations.This result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy in identifying and categorizing instances of network intrusion. 展开更多
关键词 Artificial neural networks intrusion detection system CLASSIFICATION NSL-KDD dataset machine and deep-learning neural network
下载PDF
Application of Mass Spectrometry (MS)-coupled Techniques in Pesticide Residue Detection 被引量:1
16
作者 Lei WANG Rundong Qiang +5 位作者 Aili XIANG Liang ZHANG Mingyuan YUN Huihui LIU Shuo YANG Jinlu LI 《Agricultural Biotechnology》 CAS 2023年第5期59-61,共3页
Pesticide residue detection is an important work to ensure the quality safety of agricultural products.In the process of agricultural production,in order to prevent and control agricultural diseases and pests,a certai... Pesticide residue detection is an important work to ensure the quality safety of agricultural products.In the process of agricultural production,in order to prevent and control agricultural diseases and pests,a certain amount of pesticides need to be used.However,if pesticides are used excessively,there will be certain pesticide residues in crops and related products.Therefore,it is necessary to do a good job in pesticide residue detection.The gas chromatography-mass spectrometry(GC-MS)and liquid chromatography-mass spectrometry(LC-MS)detection methods have good results and can effectively detect pesticide residues in related products.This paper reviewed and analyzed the application of GC-MS and LC-MS in pesticide residue detection,and proposed optimization measures based on practical experience,hoping to provide reference for relevant scholars. 展开更多
关键词 Gas chromatography-mass spectrometry Liquid chromatography-mass spectrometry Pesticide residues detection analysis APPLICATION
下载PDF
Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques
17
作者 Okba Taouali Sawcen Bacha +4 位作者 Khaoula Ben Abdellafou Ahamed Aljuhani Kamel Zidi Rehab Alanazi Mohamed Faouzi Harkat 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1593-1609,共17页
Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining ... Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score. 展开更多
关键词 Machine learning data-driven technique KPCA KPLS intrusion detection IoT Internet of Medical Things(IoMT)
下载PDF
Improving the Segmentation of Arabic Handwriting Using Ligature Detection Technique
18
作者 Husam Ahmad Al Hamad Mohammad Shehab 《Computers, Materials & Continua》 SCIE EI 2024年第5期2015-2034,共20页
Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthr... Recognizing handwritten characters remains a critical and formidable challenge within the realm of computervision. Although considerable strides have been made in enhancing English handwritten character recognitionthrough various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexityarises from the diverse array of writing styles among individuals, coupled with the various shapes that a singlecharacter can take when positioned differently within document images, rendering the task more perplexing. Inthis study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locatethe local minima of the vertical and diagonal word image densities to precisely identify the segmentation pointsbetween the cursive letters. The proposed method starts with pre-processing the word image without affectingits main features, then calculates the directions pixel density of the word image by scanning it vertically and fromangles 30° to 90° to count the pixel density fromall directions and address the problem of overlapping letters, whichis a commonly attitude in writing Arabic texts by many people. Local minima and thresholds are also determinedto identify the ideal segmentation area. The proposed technique is tested on samples obtained fromtwo datasets: Aself-curated image dataset and the IFN/ENIT dataset. The results demonstrate that the proposed method achievesa significant improvement in the proportions of cursive segmentation of 92.96% on our dataset, as well as 89.37%on the IFN/ENIT dataset. 展开更多
关键词 Arabic handwritten SEGMENTATION image processing ligature detection technique intelligent recognition
下载PDF
Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks
19
作者 R.Saravanan R.Muthaiah A.Rajesh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2339-2356,共18页
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second... This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques. 展开更多
关键词 Cognitive radio network spectrum sensing noise uncertainty modified black widow optimization algorithm energy detection technique
下载PDF
Major allergens in 8 types of allergenic foods and allergen detection techniques
20
作者 Yan Lu Chun-Ming Dong 《Food and Health》 2023年第3期27-39,共13页
In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten hum... In recent years,the prevalence of allergens in food warning notices,both domestically and internationally,has become the second leading concern after microbial contamination.Among the various factors that threaten human health reported by the World Health Organization,food allergy ranks fourth,and food allergy has become a global security problem.As of now,no definitive treatment for food allergies exists,making the avoidance of allergen-containing foods the most effective prevention method.Consequently,labeling foods with allergen information serves as a crucial warning for allergic populations.Moreover,to enhance comprehension of food allergies,this article provides a brief overview of their definition and sensitization mechanisms.The main focus lies in highlighting the structure of primary allergens found in eight commonly allergenic foods and the resulting clinical symptoms they cause.Additionally,a summary of commonly employed allergen detection techniques is presented,with an analysis of their principles,advantages,and limitations.Looking ahead,the integration of diverse technological approaches to establish an efficient,accurate,and affordable allergen detection method remains a significant trend.This article has certain reference value for understanding the direction of food allergies. 展开更多
关键词 food allergy allergen labeling sensitized food major allergens detection technique
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部