Cancer is a leading cause of death worldwide, and early detection is crucial for effective treatment. Machine learning (ML) algorithms have shown promising results in detecting cancer from clinical data and other biom...
详细信息
Natural language processing (NLP) implemented in digital scientific records (EMRs) can substantially enhance the nice and efficiency of affected person care. The purpose of NLP implemented in EMRs is to extract applic...
详细信息
Radio Frequency Identification (RFID) is a technology that is used widely for mobile payment, the security is the main issue of the usage of this technology. The aim of this study is to identify the key factors influe...
详细信息
The significance of cybersecurity resides in its ability to safeguard individuals and enterprises against cyberattacks, as well as the unauthorized acquisition or misplacement of confidential and classified data. Cybe...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
The significance of cybersecurity resides in its ability to safeguard individuals and enterprises against cyberattacks, as well as the unauthorized acquisition or misplacement of confidential and classified data. Cybersecurity includes the ability to employ monitoring systems to safeguard personal data, financial information, trade secrets, intellectual property, and any sensitive government information. By establishing robust cybersecurity protocols, we can enhance our ability to safeguard against a wide range of online threats. In the present age, nearly every industry is utilizing the services of diverse machine learning and deep learning models to forecast, analyze, or produce outcomes with greater optimization and efficiency. Thus, we have employed the capacity of machine learning in the task of identifying and classifying malicious software. In this paper, we propose a machine learning-envisioned malware attack detection mechanism for edge computing-based networks. The practical implementation of the proposed technique is also provided, along with the performance comparison of several existing methods for the assigned intrusion detection task. The proposed scheme achieved the highest accuracy value as compared to the other existing methods.
The proceedings contain 51 papers. The topics discussed include: design and implementation of a virtual lab platform for academic teaching: experience in the development and use of a new platform for the digitization ...
ISBN:
(纸本)9789898704627
The proceedings contain 51 papers. The topics discussed include: design and implementation of a virtual lab platform for academic teaching: experience in the development and use of a new platform for the digitization of laboratories for computer science classes;cross organizational workflow management system with controlled disclosure and no-redundant data on blockchain;a guide for selecting research design in information systems studies;new approach for the generalized maximum flow problem;an ant colony optimization algorithm for the steel plate yard inbound problem with pre-process time and relocation;web-based light simulation and interactive configuration for lighting systems;semantic frameworks for selected domain-specific languages in our research: methodologies and applications;and tuning intersection-over-union algorithm to enhance tracking performances.
In the current new situation, the wide application of cloud technology has brought great changes to the archives work in universities. There is no doubt that the effective use of cloud technology can further expand th...
详细信息
With the application of modern informationtechnology in volleyball games, the "rules" of volleyball games can now be reflected as quickly and accurately. Statistics have gradually become an important source...
详细信息
This research paper delves into the exploration of students' viewpoints regarding the integration of smart computing for optimizing both online and offline education. Employing a meticulous approach, a comprehensi...
详细信息
In the era of pervasive computing, fog computing has emerged as a paradigm that extends cloud services to the edge of the network, enabling real-time data processing and reducing latency for time-sensitive application...
详细信息
The automation of business process modelling has become crucial for organizations seeking to improve their operational efficiency. This research presents a novel methodology that leverages fine-tuned GPT models to aut...
详细信息
暂无评论