Now showing items 1-6 of 6
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
The prevention of intrusion is deemed to be a cornerstone of network security. Although excessive work has been introduced on network intrusion detection in the last decade, finding an Intrusion Detection Systems (IDS) ...
Automatic HTML code generation from mock-up images using machine learning techniques
The design cycle for a web site starts with creating mock-ups for individual web pages either by hand or using graphic design and specialized mock-up creation tools. The mock-up is then converted into structured HTML or ...
Deep learning based security management of information systems: A comparative study
In recent years, there is a growing trend of internetization which is a relatively new word for our global economy that aims to connect each market sectors (or even devices) by using the global network architecture as the ...
Deep learning based forecasting in stock market with big data analytics
In recent years, due to the technological improvements in computers' hardware and enhancements in the machine learning techniques, there are two increasing approaches for problem-solving as the use of "Big Data" and "Parallel ...
Deep Learning Approaches for Phantom Movement Recognition
Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, ...
Empirical study on multiclass classification-based network intrusion detection
(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019-11)
Early and effective network intrusion detection is deemed to be a critical basis for cybersecurity domain. In the past decade, although a significant amount of work has focused on network intrusion detection, it is still ...