Breast cancer is one of the most common cancer types. this is the second-leading cause of cancer-related death in women. It ranked 2nd according to available data lung cancers is the only one causing more causalities....
详细信息
In a world where people are busy with job life, people who stay away from family and live in far cities, who have no one to go back home to, it is difficult to balance home and work life. Here the social cause we are ...
详细信息
the health care sector is focusing on in-home health care services, where the patients can receive medical care in the privacy of their own home. A patient in a rural region can use a remote health monitoring system t...
详细信息
the proceedings contain 45 papers. the topics discussed include: show me your attach request and I'll tell you who you are: practical fingerprinting attacks in 4G and 5G mobile networks;a scary peek into the futur...
ISBN:
(纸本)9781665421416
the proceedings contain 45 papers. the topics discussed include: show me your attach request and I'll tell you who you are: practical fingerprinting attacks in 4G and 5G mobile networks;a scary peek into the future: advanced persistent threats in emerging computing environments;reliability models and analysis for triple-model with triple-input machinelearning systems;security orchestration, automation, and response engine for deployment of behavioral honeypots;a co-evolutionary algorithm-based malware adversarial sample generation method;securing password authentication for web-based applications;graph neural network-based android malware classification with jumping knowledge;multi-task learning model based on multiple characteristics and multiple interests for CTR prediction;device-to-device task offloading in a stochastic invalid-device scenario with social awareness;and a novel approach for providing client-verifiable and efficient access to private smart contracts.
For the effective implementation of Intelligent Transportation Systems (ITS), accurate and timely traffic flow information is critical. Traffic data has exploded in recent years, ushering in the era of big data. the m...
详细信息
Sign language assumes a significant part in filling the oral communication void for non-hearing or hard of hearing people. Despite the use of sign language, most people might not understand sign language clearly. Glob...
详细信息
ISBN:
(数字)9781665484220
ISBN:
(纸本)9781665484220
Sign language assumes a significant part in filling the oral communication void for non-hearing or hard of hearing people. Despite the use of sign language, most people might not understand sign language clearly. Globally, research has been ongoing to explore and recommend various sign language recognition systems for different sign languages. On the other hand, researchers are still faced with challenges of practically implementing recognition systems. though, machinelearning has emerged as one of the advanced sign language recognition systems. Artificial neural network (ANN) models and techniques are machinelearning models which are widely utilised to improve the accuracy level thus offering better results when recognising sign language gestures. However, there are few or no actively existing South African Sign Language (SASL) automatic recognition systems readily available to facilitate communication seamlessly and instantly between non-hearing and hearing people. this research concluded that application of finger tracking technique significantly improved feature extraction, training and prediction of hand gestures produced under different conditions, i.e. skin color and background. While the application of artificial neural network on SASL recognition system led to better performance with 98.77% and 97.5% accuracy scores during training and prediction, respectively. In this paper, the proposed ANN utilised finger tracking techniques and forward and backward algorithms to implement a system that recognizes fingerspelling in SASL.
the proceedings contain 64 papers. the topics discussed include: real-time fixed-point hardware accelerator of convolutional neural network on FPGA based;dependable cnc controller using raspberry pi and cloud computin...
ISBN:
(纸本)9781665499729
the proceedings contain 64 papers. the topics discussed include: real-time fixed-point hardware accelerator of convolutional neural network on FPGA based;dependable cnc controller using raspberry pi and cloud computing;smart potato disorders diagnostic system based on fuzzy k-nearest neighbor;review of personalized cancer treatment withmachinelearning;image processing-based vehicle class identification in mixed traffic;image cryptography: a systematic review;why bee colony is the most suitable with multi-query optimization?;gamification tool design for reducing requirements ambiguity during elicitation;new graphical ultimate processor for mapping relational database to resource description framework;group of models of error flow sources for discrete q-ary channels;predicting banking customer churn based on artificial neural network;and a framework for enhancing the supply of scientific research projects using blockchain.
the increasing sophistication of network attacks and the inability of traditional defensive techniques such as firewalls or weak passwords against them have led researchers to propose network intrusion detection syste...
详细信息
ISBN:
(数字)9781665421416
ISBN:
(纸本)9781665421416
the increasing sophistication of network attacks and the inability of traditional defensive techniques such as firewalls or weak passwords against them have led researchers to propose network intrusion detection systems. Many network intrusion detection systems using machinelearning techniques have been proposed, but the detection performance of some systems can be further improved. In addition, many systems adopted multiple machinelearning classifiers to cooperate in generating detection results, but the individual classifiers in the system are often difficult to operate independently, limiting the flexibility of the system. this paper presents a Clustering-Based Network Intrusion Detection System, which applies the concept of clustering to detect network attacks by using the K-Nearest Neighbor algorithm for the initial detection of network attack types, and the Decision Tree algorithm specializes in detecting specific types of attacks. this improves the detection performance of the system and maintains the usability of an individual classifier.
One of the most under-researched area in the field of natural language processing (NLP) has been the text classification. Text classification of languages like Urdu is more deprived of research since it is not among t...
详细信息
the rapid adoption of mobile money is due to the penetration of smart devices and the reduced cost of computing power. Today, many rural dwellers use mobile smart devices (Ofcom, 2022). A financial solution that creat...
详细信息
ISBN:
(纸本)9789819638109;9789819638116
the rapid adoption of mobile money is due to the penetration of smart devices and the reduced cost of computing power. Today, many rural dwellers use mobile smart devices (Ofcom, 2022). A financial solution that creates a transaction system through mobile smart devices is instrumental in closing the financial inclusion gap. Mobile money offers digital financial service providers access to an untapped market that is profitable. there has been a shift from traditional banking to digital banking services (mobile money). this is due to a rapid increase in mobile phone penetration and reliance on domestic remittances in many households (Mauree and Kohli, 2013). Withthe broad internet usage, modern technologies, and the current growth of digital financial service providers, there is a need for financial institutions to mitigate against financial crimes and fraudulent activities (Wewege et al., 2020). the sporadic expansion of digital transformation has made digital financial services providers vulnerable to cyber risks. the continuous partnerships withthird parties, technology providers and fintech companies have heightened their vulnerability to cyber-attacks (Tsys, 2017). More people are prioritizing their delicate personal data against hacking, identity theft, cyberattacks and money laundering. Digital banks with lesser security infrastructure and small fintech companies are more prone to financial fraud and cyber risks. Hence, digital financial service providers and fintech companies should continuously update their security infrastructure (Wewege et al., 2020). this study focuses on how fintech companies can maximize improved machinelearning algorithms for fraud detection.
暂无评论