In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreArtificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More