Information networks
-
Accurate forecasting of the electrical load is a critical element for grid operators to make well-informed decisions concerning electricity generation, transmission, and distribution. In this study, an Extreme Learning Machine (ELM) model was proposed and compared with four other machine learning models including Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU).
10p viengfa 28-10-2024 2 1 Download
-
In this study, an RS-485 protocol for Arduino boards that operate in Master-Slave networks was developed. Network operations could be carried out independently on the main thread program, and devices in the network could react quickly to information received.
10p viling 11-10-2024 2 1 Download
-
In this study, we propose a method for generating mutated Windows malware against malware detection based on ensemble learning by combining GANs and RL to overcome the limitations of the MalGAN model.
15p viyoko 01-10-2024 2 1 Download
-
In this paper, we research and propose a network attack detection framework using a 2-stage classification algorithm with an Autoencoder model, integrating online stream processing technology based on Apache Kafka and Spark technology.
17p viyoko 01-10-2024 3 1 Download
-
In this article, we have researched, compared and evaluated current methods for solving problems such as data augmentation, data generation via generative networks and classing importance control. Additionally, we will also provide a brief overview of existing datasets for intrusion detection in wireless networks.
12p viyoko 01-10-2024 5 1 Download
-
In this paper, we propose an enhanced method (named FeaWAD*) that improves the data encoding strategy based on the FeaWAD network. These models require only a small fraction of anomalies for training.
9p viyoko 01-10-2024 7 1 Download
-
For this aim, we propose to study a controlled fractional network-based SCIRS (Susceptible - Carrier - Infectious - Recovered - Susceptible) malware propagation model and its stabilization problem based on fractional interconnected TakagiSugeno fuzzy system.
11p viyoko 01-10-2024 2 1 Download
-
This paper proposes a new method of representing malicious code as an image by arranging highly correlated bytes in close pixels in the image. The current research trains deep learning models on self-built datasets and compare the performance of different image representation methods.
9p viyoko 01-10-2024 3 1 Download
-
Currently, machine learning not only solves simple problems such as object classification but also machine learning is widely applied in the field of computer vision such as identification systems, object detection, and modules in the authentication system, intelligent processing algorithms such as automatic driving, chatbot, etc.
14p viyoko 01-10-2024 1 1 Download
-
This paper proposes and implements a model combining Zalo and end-toend encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model.
14p viyoko 01-10-2024 3 1 Download
-
This article focuses on one of the methods to improve the data processing performance of firewalls by taking advantage of the power of FPGA (Field-Programmable Gate Array) chips in analyzing packets at the network layer instead of CPU.
10p viyoko 01-10-2024 12 1 Download
-
In this paper, we aim to enhance spectrum efficiency in infrastructure-based Non-Orthogonal Multiple Access (NOMA) networks over Rayleigh fading channels. To achieve this, we introduce a Simultaneous Wireless Information and Power Transfer (SWIPT)-enabled Two-Way Relay (TWR) system.
9p viyoko 01-10-2024 2 1 Download
-
The study advocates for the seamless integration of BIM, creating digital modeling that encompasses various input data, from geometry to costs. This integrated approach enhances real-time collaboration, mitigates errors during design, and streamlines construction processes by aiding scheduling, resource allocation, and progress monitoring.
6p viyoko 01-10-2024 2 1 Download
-
The purpose of this study is to investigate the impact of Electronic word of mouth through social networking platforms on purchase intention of Vietnamese customers in cosmetics field. To conduct the study, the author built up five hypotheses based on the previous studies about EWOM. The outcomes obtained from the data analysis have made the picture clearer when among different factors of eWOM, the quality of eWOM information, the attitude of eWOM information regarding cosmetics have positive impact on cosmetic purchase intention of Vietnamese customers.
20p toduongg 24-08-2024 1 0 Download
-
Social media are currently building their own empire and power since they have great influence in a flat world. They play an important role in the communication of human beings i.e. sharing information and connecting people. Social media have become the main sources of getting latest news and platforms to spread ideas and mindsets. It is therefore essential to know and understand social media’s key vocabulary and terminologies. The paper analyses and synthesizes 100 collected words concerning social media.
4p tuongtrihoai 23-07-2024 8 3 Download
-
This study examined the current situation of the Serbian Orthodox Church both in its Australian and transnational contexts since the Serbian Orthodox Church functions as transnational network with churches linked globally. The research strategy was a combination of qualitative and quantitative methods. This included a case study approach which focused in four parishes in Australia, including interviews which involved forty six participants affiliated to Serbian Orthodoxy and four Serbian Orthodox priests who were individually interviewed.
164p runthenight07 01-03-2023 8 4 Download
-
This research is a single case study of the impact of the introduction of both information technology (software, hardware and Internet) and a company policy about IT use on the internal operations of a fire truck assembly company and its supply chain relationships. Using Action Research, the research focuses on a fire truck assembly company in Thailand, where supply chain efficiency was not improving and where costs of, and relationships with, both upstream suppliers and downstream clients in the supply chain were increasing.
306p runthenight04 02-02-2023 8 2 Download
-
Tài liệu giảng dạy Tiếng Anh chuyên ngành Công nghệ thông tin (English for Information Technology) gồm có những nội dung chính sau: Unit 1 computer uses; unit 2 types of computer; unit 3 keyboard and mouse; unit 4 input devices; unit 5 output devices; unit 6 storage devices; unit 7 networks. Mời các bạn cùng tham khảo để biết thêm nội dung chi tiết.
41p runordie10 09-10-2022 77 10 Download
-
Tài liệu giảng dạy Tiếng Anh chuyên ngành Công nghệ thông tin (English for Information Technology) được biên soạn gồm 7 units, cụ thể như sau: Unit 1: Computer uses, unit 2: Types of computer, unit 3: Keyboard and mouse, unit 4: Input devices, unit 5: Output devices, unit 6: Storage devices, unit 7: Networks. Mời các bạn cùng tham khảo.
41p runordie10 09-10-2022 35 7 Download
-
Bài viết đã mô hình hóa việc lưu trữ nội dung thông qua bài toán Knapsack. Bài toán lữu trữ có hai mục tiêu: tối đa hóa lỉ lệ hit tại nút mạng hoặc tối thiểu lưu lượng nội dung trên đường truyền backhaul tương ứng với các bài toán max_hit hoặc min_transit. Từ giải thuật greedy giải bài toán quy hoạch tuyến tính xấp xỉ của bài toán Knapsack, bài viết đề xuất hai thuật toán loại bỏ nội dung đó là max_hit và min_transit. Mời các bạn cùng tham khảo!
6p wangziyi_1307 26-04-2022 38 5 Download