Advanced Search
Displaying 1-10 on page 1 of 43. Per Page  

Articles / Online

  • Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection
  • Abstract The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models…
  • More
  •   Views:300       Downloads:217        Download PDF
  • Quantum Cryptography–A Theoretical Overview
  • Abstract Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography.
  • More
  •   Views:460       Downloads:313        Download PDF
  • Grover’s Algorithm in a 4-Qubit Search Space
  • Abstract This paper provides an introduction to a quantum search algorithm, known as Grover’s Algorithm, for unsorted search purposes. The algorithm is implemented in a search space of 4 qubits using the Python-based Qiskit SDK by IBM. While providing detailed proof, the computational complexity of the algorithm is generalized to n qubits. The implementation results obtained from the IBM QASM Simulator and IBMQ Santiago quantum backend are analyzed and compared. Finally, the paper discusses the challenges faced in implementation and real-life applications of the algorithm hitherto. Overall, the implementation and analysis depict the advantages of this quantum search algorithm over its…
  • More
  •   Views:404       Downloads:426        Download PDF
  • Implementation of Art Pictures Style Conversion with GAN
  • Abstract Image conversion refers to converting an image from one style to another and ensuring that the content of the image remains unchanged. Using Generative Adversarial Networks (GAN) for image conversion can achieve good results. However, if there are enough samples, any image in the target domain can be mapped to the same set of inputs. On this basis, the Cycle Consistency Generative Adversarial Network (CycleGAN) was developed. This article verifies and discusses the advantages and disadvantages of the CycleGAN model in image style conversion. CycleGAN uses two generator networks and two discriminator networks. The purpose is to learn the mapping…
  • More
  •   Views:357       Downloads:374        Download PDF
  • Incomplete Image Completion through GAN
  • Abstract There are two difficult in the existing image restoration methods. One is that the method is difficult to repair the image with a large damaged, the other is the result of image completion is not good and the speed is slow. With the development and application of deep learning, the image repair algorithm based on generative adversarial networks can repair images by simulating the distribution of data. In the process of image completion, the first step is trained the generator to simulate data distribution and generate samples. Then a large number of falsified images are quickly generated using the generative…
  • More
  •   Views:339       Downloads:300        Download PDF
  • A Hybrid Intrusion Detection Model Based on Spatiotemporal Features
  • Abstract With the accelerating process of social informatization, our personal information security and Internet sites, etc., have been facing a series of threats and challenges. Recently, well-developed neural network has seen great advancement in natural language processing and computer vision, which is also adopted in intrusion detection. In this research, a hybrid model integrating MultiScale Convolutional Neural Network and Long Short-term Memory Network (MSCNN-LSTM) is designed to conduct the intrusion detection. Multi-Scale Convolutional Neural Network (MSCNN) is used to extract the spatial characteristics of data sets. And Long Short-term Memory Network (LSTM) is responsible for processing the temporal characteristics. The data…
  • More
  •   Views:378       Downloads:285        Download PDF
  • IOTA-Based Data Encryption Storage and Retrieval Method
  • Abstract At present, the traditional blockchain for data storage and retrieval reflects the characteristics of slow data uploading speed, high cost, and transparency, and there are a lot of corresponding problems, such as not supporting private data storage, large data operation costs, and not supporting Data field query. This paper proposes a method of data encryption storage and retrieval based on the IOTA distributed ledger, combined with the fast transaction processing speed and zero-value transactions of the IOTA blockchain, through the Masked Authenticated Messaging technology, so that the data is encrypted in the data stream. The form is stored in the…
  • More
  •   Views:315       Downloads:265        Download PDF
  • Lifetime Prediction of LiFePO4 Batteries Using Multilayer Classical-Quantum Hybrid Classifier
  • Abstract This article presents a multilayer hybrid classical-quantum classifier for predicting the lifetime of LiFePO4 batteries using early degradation data. The multilayer approach uses multiple variational quantum circuits in cascade, which allows more parameters to be used as weights in a single run hence increasing accuracy and provides faster cost function convergence for the optimizer. The proposed classifier predicts with an accuracy of 92.8% using data of the first four cycles. The effectiveness of the hybrid classifier is also presented by validating the performance using untrained data with an accuracy of 84%. We also demonstrate that the proposed classifier outperforms traditional…
  • More
  •   Views:343       Downloads:306        Download PDF
  • Improved Prediction and Understanding of Glass-Forming Ability Based on Random Forest Algorithm
  • Abstract As an ideal material, bulk metallic glass (MG) has a wide range of applications because of its unique properties such as structural, functional and biomedical materials. However, it is difficult to predict the glass-forming ability (GFA) even given the criteria in theory and this problem greatly limits the application of bulk MG in industrial field. In this work, the proposed model uses the random forest classification method which is one of machine learning methods to solve the GFA prediction for binary metallic alloys. Compared with the previous SVM algorithm models of all features combinations, this new model is successfully constructed…
  • More
  •   Views:617       Downloads:584        Download PDF
  • A Bi-Histogram Shifting Contrast Enhancement for Color Images
  • Abstract Recent contrast enhancement (CE) methods, with a few exceptions, predominantly focus on enhancing gray-scale images. This paper proposes a bihistogram shifting contrast enhancement for color images based on the RGB (red, green, and blue) color model. The proposed method selects the two highest bins and two lowest bins from the image histogram, performs an equalized number of bidirectional histogram shifting repetitions on each RGB channel while embedding secret data into marked images. The proposed method simultaneously performs both right histogram shifting (RHS) and left histogram shifting (LHS) in each histogram shifting repetition to embed and split the highest bins while…
  • More
  •   Views:604       Downloads:605        Download PDF
Displaying 1-10 on page 1 of 43. Per Page