The rapid development of Internet of Things (IoT) devices and their increasing numbers have caused a tremendous increase in network traffic and a wider range of cyber-attacks. This growing trend has complicated the detection process for traditional intrusion detection systems and heightened the challenges faced by these devices, such as imbalanced and large training data. This study presents a cohesive methodology of a series of intelligent techniques to prepare clean and balanced data for training the first (core) layer of a robust hierarchical intrusion detection system. The methodology was built by cleaning and compressing the data using an Autoencoder and preparing a strong latent space for balancing using a hybrid method that combines Grey Wolf Optimization (GWO) with Borderline-SMOTE. Particle Swarm Optimization (PSO) was used to select the most important features that provide the greatest amount of information for training the first layer, which was built using deep learning techniques, and linking them in a hybrid manner that combines a Convolutional Neural Network–Long Short-Term Memory (CNN–LSTM) and the Attention mechanism. The proposed model was evaluated using two different types of datasets: the CICIOT2023 dataset, which is characterized by its large size and significant variation in the number of attacks, and the UNSW-NB15 dataset, which is characterized by its simplicity and less imbalance compared to the first dataset, to prepare and generalize the system across multiple environments. The proposed class showed binary classification results with an accuracy of 0.94, an Area Under the Curve (AUC) of 0.93, an optimized F1-score of 0.338, and a Matthews Correlation Coefficient (MCC) of 0.324 at the best threshold on the CICIoT2023 dataset. It also achieved an accuracy of approximately 0.96, an AUC of 0.985, and an MCC of over 0.82 on the UNSW-NB15 dataset. These results confirmed the construction of a strong and resilient layer, preparing the foundation for a robust hierarchical offside detection system.
Cryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreFace recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.
A substantial percentage of the world’s energy consumption (almost 40%) and carbon dioxide (CO2) emissions (around 37%) come from the construction industry, especially schools. This work presents a new hybrid artificial intelligence (AI) engineering model that aims to maximize energy performance on campuses in a holistic way. Modules for data-driven forecasting, metaheuristic optimization, and real-time adaptive control are all part of the concept. A thorough energy simulation of a university campus building is used in conjunction with the AI model to assess its performance through a co-simulation framework. Findings show that yearly peak electricity demand may be reduced by 18.7% and total site energy consumption by 22.4% when co
... Show MoreArtificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More