ARCHIVES
Enhanced Cybersecurity via Deep LSTM Networks for Intrusion Detection
¹²³ Students, Department of Computer Science Engineering JIT, Nagpur, Maharashtra, India. ⁴Assistant.Professor, Department of Computer Science Engineering JIT, Nagpur, Maharashtra, India.
Published Online: September-December 2024
Pages: 17-19
Deep Long Short-Term Memory Recurrent Neural network (LSTM-RNN) methodology is consists of pre-processing, training and testing phases. The raw data attributes consist of numerical and non-numerical values. Non-numerical values need to be conversion of numerical values because the LSTM-RNN model requires numerical attribute values as input. The numericalization process can be done with one-hot encoding. One-hot encoding assigns unique feature values to the non-numerical features. Some numerical zed data attributes consist of large feature value and some attributes consist of minimum value. The difference between minimum feature value and maximum feature value is very large. This difference affects the original feature values. The normalization process avoids the effectiveness of the original feature values. Normalization could be done with min-max normalization.
Related Articles
2024
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
2024
Stock Price Prediction Using LSTM
2024
Digital Transformation in Tailoring:Thread Express Application
2024
Form Perfector
2024
A Review- Machine Learning Techniques for Text Summarization
2024
Footwear-Based Assistive Technology for Lower Limb Amputees
2024
Object Detection for Unmanned Aerial Vehicles: A Comprehensive Review
2024
Automatic Diabetic Retinopathy Detection Using Resnet50 and Inceptionv3
2024
AI Based College Surveillance System for Class Skipper
2024
Bird Species Detection Using Deep Learning


