Search results for "Information System"
showing 10 items of 2404 documents
A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks
2022
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and testing time. For the purpose of anomaly identification, researchers have developed several machine learning and deep learning-based algorithms; nonetheless, accurate anomaly detection with low test and train times remains a challenge. Using a hybrid feature selection approach and a deep neural network- (DNN-) based classifier, the authors of this re…
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home
2022
The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes a…
Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications
2022
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) …
Wireless Acoustic Sensor Networks and Applications
2017
Simultaneous segmentation and beam-hardening correction in computed microtomography of rock cores
2013
We propose a post-reconstruction correction procedure for the beam-hardening artifact that neither requires knowledge of the X-ray spectrum nor of the attenuation coefficients in multi-mineral geologic samples. The beam-hardening artifact in polychromatic X-ray computer tomography (CT) hampers segmentation of the phase assemblage in geologic samples. We show that in cylindrically shaped samples like rock cores, the X-ray attenuation value for a single phase depends mainly on the distance from the center of the cylinder. This relationship could be easily extracted from the CT data for every phase and used to infer the presence of these phases at all positions in the sample. Our new approach …
Utilizing a Wristband to Detect the Quality of a Performed CPR
2019
Effect of the high-level trigger for detecting long-lived particles at LHCb.
2022
Long-lived particles (LLPs) show up in many extensions of the Standard Model, but they are challenging to search for with current detectors, due to their very displaced vertices. This study evaluated the ability of the trigger algorithms used in the Large Hadron Collider beauty (LHCb) experiment to detect long-lived particles and attempted to adapt them to enhance the sensitivity of this experiment to undiscovered long-lived particles. A model with a Higgs portal to a dark sector is tested, and the sensitivity reach is discussed. In the LHCb tracking system, the farthest tracking station from the collision point is the scintillating fiber tracker, the SciFi detector. One of the challenges i…
Towards more relevance-oriented data mining research
2008
Data mining (DM) research has successfully developed advanced DM techniques and algorithms over the last few decades, and many organisations have great expectations to take more benefit of their data warehouses in decision making. Currently, the strong focus of most DM-researchers is still only on technology-oriented topics. Commonly the DM research has several stakeholders, the major of which can be divided into internal and external ones each having their own point of view, and which are at least partly conflicting. The most important internal groups of stakeholders are the DM research community and academics in other disciplines. The most important external stakeholder groups are manager…
Artificial Neural Networks and Linear Discriminant Analysis: A Valuable Combination in the Selection of New Antibacterial Compounds
2004
A set of topological descriptors has been used to discriminate between antibacterial and nonantibacterial drugs. Topological descriptors are simple integers calculated from the molecular structure represented in SMILES format. The methods used for antibacterial activity discrimination were linear discriminant analysis (LDA) and artificial neural networks of a multilayer perceptron (MLP) type. The following plot frequency distribution diagrams were used: a function of the number of drugs within a value interval of the discriminant function and the output value of the neural network versus these values. Pharmacological distribution diagrams (PDD) were used as a visualizing technique for the i…
Support Tool for the Combined Software/Hardware Design of On-Chip ELM Training for SLFF Neural Networks
2016
Typically, hardware implemented neural networks are trained before implementation. Extreme learning machine (ELM) is a noniterative training method for single-layer feed-forward (SLFF) neural networks well suited for hardware implementation. It provides fixed-time learning and simplifies retraining of a neural network once implemented, which is very important in applications demanding on-chip training. This study proposes the data flow of a software support tool in the design process of a hardware implementation of on-chip ELM learning for SLFF neural networks. The software tool allows the user to obtain the optimal definition of functional and hardware parameters for any application, and e…