Latest News

** For Peer Reviewed, UGC App, UGC CARE, Scopus and WoS (M) 8708927219 (W) 9034872290

Categories

QR Code

Visitor Counter

Large Visitor Map



S.No Particular Pdf Page No.
1
  • ENSEMBLE-ENHANCED THREAT INTELLIGENCE NETWORK (EETIN): A UNIFIED APPROACH FOR IOT ATTACK DETECTION



Ajay Chandra MK

Abstract:
The procedure of identifying and reacting to unauthorized or malicious behaviours within the IOT system, is called IOT attack detection. There are some several advantages and challenges associated with implementing and maintaining the detection systems. Some of the limitations are Complexity, false positive and negative and scalability. To defeat these restrictions, we suggested a deep-learning based classification model (INTE). The proposed methodology consists of (1) Pre-Processing (2) Customized Dimensionality Reduction (3) Feature Extraction (4) Deep Learning-based Classification via Intelligent Network Threat Ensemble (INTE) Model (5) Evaluating and Testing. In pre-processing, the gathered data are pre-processed via data cleaning and Transformation. The pre-processed data are used to dimensionality reduction using O-PCA. The principal components are optimized via TLBO (Teaching learning-based optimization). Then the dimensionality reduced data are utilized to filter the relevant features using Time and frequency domain features and non-linear features. The extracted features are used to classify the attack detection via INTE model which is a combination of CNN, RNN and transformer-based model. And, the model will be evaluated using the performance metrics. The proposed methodology is executed using MATLAB.


1-24
2
  • AVAILABILITY AND PROFIT ANALYSIS OF A REPAIRABLE 2-OUT-OF-4 SYSTEM



Elam Siwach1,Dr. Sangeeta Malik2, Dr. Jai Bhagwan3

Abstract:
In this paper Availability and Profit Analysis of a Repairable 2-Out-Of-4 Systemusing RPGTand single server which may also fail is carried out. The associate structure, which also oversees preventative maintenance for wholly categories of units and has a repair facility that is, modelled for dependability performance extents, gearshifts the act of these online and down units. Taking steady failure and repair rates of units and facilities a steady state transition diagram is drawn using (depicting transition rates and states) Markov process. The results of the sensitivity analysis can be used to validate or challenge existing models and assumptions about the system.


25-34
Collaboration Partners
  • Indian Journals

  • Swedish Scientific
    Publications

  • The Universal
    Digital Library

  • Green Earth Research
    And Publishing House

  • Rashtriya Research Institute
    Of New Medical Sciences

Indexing By