Generative AI is transforming education by providing innovative tools for personalized learning, content creation, and teaching assistance. This paper explores the potential of generative AI in enhancing teaching meth...
详细信息
The rise of quantum computing introduces substantial risks to traditional cryptographic protocols, which are vulnerable to quantum decryption methods such as Shor's algorithm. To address these emerging threats, th...
详细信息
Reinforcement learning (RL) is a highly effective approach for teaching intelligent agents to make decisions in challenging and ever-changing contexts. With the increasing use of RL in real-world situations, there is ...
详细信息
In the past ten years, the Internet of Things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and ra...
详细信息
In the past ten years, the Internet of Things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and rapidly escalating demand for intelligent devices and networks mean that IoT is currently encountering unprecedented security challenges. While there are established security protocols in place for IoT, these conventional methods fall short in effectively addressing the escalating frequency and severity of attacks. The term 'security' is used to encompass various concepts, including integrity, confidentiality, and privacy. Therefore, a strong and up-to-date security system is necessary for the next generation of industrial IoT. One area of technological advancement that can address the ongoing and future challenges of IoT security is Soft computing. It has opened up many possible research avenues for detecting attacks and identifying abnormal behaviors in smart devices and networks. This paper explores the architecture of IoT and provides a comprehensive literature review of Soft computing based approaches to IoT security, including the different types of possible attacks. It also presents potential Soft computing-based solutions for IoT security and discusses open research issues along with future research scope.
Person re-identification has been an important issue of surveillance systems in smart cities. However, this requires huge datasets to supervise deep learning models for accurately identifying and tracking people in sm...
详细信息
The advent of the education metaverse has transformed the landscape of learning and teaching, offering immersive and dynamic. The Education Metaverse represents a transformative paradigm shift in the field of educatio...
详细信息
Traditional teaching methods in Indian schools often lack engaging elements, hindering students' full comprehension of concepts and fostering a tendency to memorize rather than understand. Existing solutions fail ...
详细信息
This paper presents an in-depth analysis on brain stroke prediction using machine learning based approaches for prediction and classification. We take on a wide range of data sources, including demographic data, medic...
详细信息
The current research questions that are raising concern security in cloud computing. Cloud storage is replacing traditional data storage in numerous companies because it provides instant knowledge of data from any loc...
详细信息
The current research questions that are raising concern security in cloud computing. Cloud storage is replacing traditional data storage in numerous companies because it provides instant knowledge of data from any location. However, the main problem stopping businesses from utilizing cloud computing is data security. Cloud computing has been one of the most talked about subjects in technology lately due to its capacity to manage a large number of resources and data. One of the biggest obstacles is scheduling tasks, and inefficient management leads to performance decline. This paper presents a unique method for productive task scheduling with improved security in a cloud computing environment. It is suggested to design the operations using a unique Convolutional neural network optimized modified butterfly optimization (CNN-MBO) approach in order to improve efficiency and shorten construction time. Second, the data is encrypted using a hybridized RSA method, ensuring safe data transfer. The performance of our suggested technique is then evaluated by simulating it using a cloudlet simulator and analyzing the evaluation findings. The suggested method is also contrasted with alternative task scheduling-based methods for a number of performance criteria, including resource usage, reaction time, and energy consumption.
The rapid growth of the Internet of Things has led to the generation of vast amounts of data, which presents both challenges and opportunities for researchers and practitioners. Machine learning and deep learning tech...
详细信息
暂无评论