Bangla Handwriting Resource Generation and Recognition Using Deep Learning Algorithms DOI
Md. Tariqul Islam,

Md. Abu Saim,

Akhsya Ghuha Opey

и другие.

Опубликована: Дек. 21, 2023

Maintaining cultural and linguistic diversity is a challenge in an increasingly digital world. For language like Bangla, with rich script heritage, preserving the essence of handwritten text crucial. The research employs Deep Learning algorithm, to decipher nuances Bangla script. algorithm learns mimic fluid strokes, unique characters, artistic intrinsic through extensive training on authentic dataset. To democratize use this technology, user-friendly model interface for generating developed. This allows users, regardless technical expertise, seamlessly recognize into beautiful imagery. However, Bangla's beauty not just act conservation; it's testament our commitment diversity. paper addresses by proposing novel approach recognizing image format, leveraging

Язык: Английский

A Transformer Based Malicious Traffic Detection Method in Android Mobile Networks DOI
Yuhao Sun, Hao Peng, Yingjun Chen

и другие.

Lecture notes in computer science, Год журнала: 2024, Номер unknown, С. 370 - 385

Опубликована: Дек. 14, 2024

Язык: Английский

Процитировано

1

Hybrid Detection Technique for IP Packet Header Modifications Associated with Store-and-Forward Operations DOI Creative Commons
Asmaa Munshi

Applied Sciences, Год журнала: 2023, Номер 13(18), С. 10229 - 10229

Опубликована: Сен. 12, 2023

The detection technique for IP packet header modifications associated with store-and-forward operation pertains to a methodology or mechanism utilized the identification and of alterations made headers within network setting that utilizes operation. problem led employing this lies fact previous research studies expected intrusion systems (IDSs) perform everything inspecting entire transmission session detecting any modification. However, in process, upon arrival at node such as router switch, is temporarily stored prior being transmitted its intended destination. Throughout duration storage, IDS tasks would not be able store packet; however, it possible certain adjustments could implemented does recognize. For reason, current uses combination convolutional neural long short-term memory predict process. CNN LSTM suggests significant improvement model’s performance an increase number packets each flow: on average, 99% was achieved. This implies when comprehending ideal pattern, model exhibits accurate predictions cases where abruptly increases. study has contribution are linked

Язык: Английский

Процитировано

2

Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network DOI Open Access
Tingting Su,

Jia Wang,

Hu Wei

и другие.

Computers, materials & continua/Computers, materials & continua (Print), Год журнала: 2024, Номер 79(3), С. 4433 - 4448

Опубликована: Янв. 1, 2024

Along with the progression of Internet Things (IoT) technology, network terminals are becoming continuously more intelligent.IoT has been widely applied in various scenarios, including urban infrastructure, transportation, industry, personal life, and other socio-economic fields.The introduction deep learning brought new security challenges, like an increment abnormal traffic, which threatens security.Insufficient feature extraction leads to less accurate classification results.In traffic detection, data is high-dimensional complex.This not only increases computational burden model training but also makes information difficult.To address these issues, this paper proposes MD-MRD-ResNeXt for detection.To fully utilize multi-scale a Multi-scale Dilated (MD) block introduced.This module can effectively understand process at scales uses dilated convolution technology significantly broaden model's receptive field.The proposed Max-feature-map Residual Dual-channel pooling (MRD) integrates maximum map residual block.This ensures focuses on key information, thereby optimizing efficiency reducing unnecessary redundancy.Experimental results show that compared latest methods, detection improves accuracy by about 2%.

Язык: Английский

Процитировано

0

Abnormal traffic detection for Internet of Things based on an improved Residual Network DOI
Weizhe Wang

Physical Communication, Год журнала: 2024, Номер 66, С. 102406 - 102406

Опубликована: Июнь 12, 2024

Язык: Английский

Процитировано

0

MMH-Net: A novel multi-modal hybrid learning network for accurate mass estimation of acoustic levitated objects DOI
Yingwei Wang, Liangxu Jiang, Ziyi Chen

и другие.

Engineering Applications of Artificial Intelligence, Год журнала: 2024, Номер 136, С. 108965 - 108965

Опубликована: Июль 18, 2024

Язык: Английский

Процитировано

0

An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices DOI
Ao Yu, Jun Tao, Dikai Zou

и другие.

2022 International Joint Conference on Neural Networks (IJCNN), Год журнала: 2024, Номер 34, С. 1 - 8

Опубликована: Июнь 30, 2024

Язык: Английский

Процитировано

0

Digital twin technology fundamentals DOI

Chakkrapong Chaiburi,

Bancha Yingngam

Elsevier eBooks, Год журнала: 2024, Номер unknown, С. 1 - 35

Опубликована: Ноя. 1, 2024

Язык: Английский

Процитировано

0

Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review DOI

Leonard L. Mutembei,

Makhamisa Senekane, Terence L. van Zyl

и другие.

Communications in computer and information science, Год журнала: 2024, Номер unknown, С. 207 - 234

Опубликована: Ноя. 26, 2024

Язык: Английский

Процитировано

0

Vehicular Network Security Through Optimized Deep Learning Model with Feature Selection Techniques DOI Creative Commons

Fida Muhammad Khan,

Taj Rahman, Asim Zeb

и другие.

Опубликована: Дек. 31, 2024

In recent years, vehicular ad hoc networks (VANETs) have faced growing security concerns, particularly from Denial of Service (DoS) and Distributed (DDoS) attacks. These attacks flood the network with malicious traffic, disrupting services compromising resource availability. While various techniques been proposed to address these threats, this study presents an optimized framework leveraging advanced deep-learning models for improved detection accuracy. The Intrusion Detection System (IDS) employs Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), Deep Belief (DBN) alongside robust feature selection techniques, Random Projection (RP) Principal Component Analysis (PCA). This extracts analyzes significant features using a publicly available application-layer DoS attack dataset, achieving higher accuracy than traditional methods. Experimental results indicate that combining CNN, LSTM networks, DBN like PCA in classification performance, 0.994, surpassing state-of-the-art machine learning models. novel approach enhances reliability safety vehicle communications by providing efficient, real-time threat detection. findings contribute significantly VANET security, laying foundation future advancements connected protection.

Язык: Английский

Процитировано

0

Bangla Handwriting Resource Generation and Recognition Using Deep Learning Algorithms DOI
Md. Tariqul Islam,

Md. Abu Saim,

Akhsya Ghuha Opey

и другие.

Опубликована: Дек. 21, 2023

Maintaining cultural and linguistic diversity is a challenge in an increasingly digital world. For language like Bangla, with rich script heritage, preserving the essence of handwritten text crucial. The research employs Deep Learning algorithm, to decipher nuances Bangla script. algorithm learns mimic fluid strokes, unique characters, artistic intrinsic through extensive training on authentic dataset. To democratize use this technology, user-friendly model interface for generating developed. This allows users, regardless technical expertise, seamlessly recognize into beautiful imagery. However, Bangla's beauty not just act conservation; it's testament our commitment diversity. paper addresses by proposing novel approach recognizing image format, leveraging

Язык: Английский

Процитировано

0