Routing attacks will have distressing effects over the network and bequest a significant challenge once planning strong security mechanisms for vehicular communication. In this paper, we examine the effect and malicio...
Routing attacks will have distressing effects over the network and bequest a significant challenge once planning strong security mechanisms for vehicular communication. In this paper, we examine the effect and malicious activities of a number of the foremost common attacks and also mention some security schemes against some major attacks in VANET. The attacker's aim is only to modify the actual route or provides the false data about the route to the sender and also some attackers are only flooding unwanted packets to consume resources in available network. Various routing approaches are also mentioned in the paper because the routing of data is very important to deliver the traffic information to leading vehicles. It's advised that a number of the ways that to approach this made field of analysis issues in VANET might be to fastidiously design new secure routing protocols in which attacks are often rendered meaningless and because of the inherent constraints found in the network, there's a desire for light-weight and sturdy security mechanisms.
Continuous item set mining is a generally exploratory procedure that centers on finding intermittent relationships among information. The unflinching advancement of business sectors and business conditions prompts the...
Continuous item set mining is a generally exploratory procedure that centers on finding intermittent relationships among information. The unflinching advancement of business sectors and business conditions prompts the need of information mining calculations to find huge relationship changes to responsively suit item and administration arrangement to client needs. Change mining, with regards to visit item sets, centers around recognizing and revealing critical changes in the arrangement of mined item sets starting with one time span then onto the next. The revelation of continuous summed up item sets, i.e., item sets that regularly happen in the source information, and give an undeniable level reflection of the mined information, gives new difficulties in the investigation of item sets that become uncommon, and accordingly are not, at this point removed, from a specific point. This task proposes a novel sort of powerful example, to be specific the A DB-Scan Dynamic Sequential Combinatorial Analysis (DSCA-SCANNING), that addresses the development of an item set in continuous time-frames, by revealing the data about its successive speculations described by insignificant excess (i.e., least degree of reflection) on the off chance that it gets rare in a specific time-frame. To address DSCA mining, it proposes DSCA, a calculation that centers around evading item set mining followed by post handling by abusing a help driven item set speculation approach. To concentrate on the insignificantly repetitive incessant speculations and hence decrease the measure of the created designs, the revelation of a savvy subset, specifically the, is tended to also in this work.
作者:
K DivyaSukhvir KaurResearch Scholar
Department of Computer Science and Engineering Lovely Professional University Phagwara India Assistant Professor
Department of Computer Science and Engineering Lovely Professional University Phagwara India
This paper outlines an introduction to dendrochronology. The tree rings are being identified through image processing and statistical simulations. The study of the tree rings is known as dendrochronology but the techn...
This paper outlines an introduction to dendrochronology. The tree rings are being identified through image processing and statistical simulations. The study of the tree rings is known as dendrochronology but the techniques do need to be modified for better performance. Image analyses convert the tree ring into digital data using imaging tools. This method involves the scaling, piling, width calculation. Technology is required to evaluate the factors of different tree ring pattern. In this review paper, literature survey has been provided which deals with the contribution of different researchers, which methodologies they preferred and what were their limitations. And two attributes are being calculated named MSE and PSNR, as these obtainable values indicates to work further with the enhanced image. Also, researcher can get idea what all the attributes are important to implement this technique.
Virtual Intelligence can be otherwise known as digital intellect. VI is one of the developing technologies of this decade. It is the result of union of two technologies that are swiftly shooting up. They are Virtual R...
Virtual Intelligence can be otherwise known as digital intellect. VI is one of the developing technologies of this decade. It is the result of union of two technologies that are swiftly shooting up. They are Virtual Reality and Artificial Intelligence. While Artificial Intelligence will make machines react like an individual, VR will create an imaginary computer universe. This tech intends in transforming machines more like people. Using this VI technology, one can feel virtual world of their desire. This technology is utilized in many fields. Virtual Intelligence will integrate the mode of teaching. This will boost the gaming sector and will play a role in automation.
作者:
R. AngelineR. VaniAssistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Professor
Department of Electronics and Communication Engineering SRM Institute of Science and Technology Ramapuram Chennai India
In this paper, ResNet a Convolutional Neural Network for detecting and diagnosing the lung disease Covid-19 pneumonia infection automatically. For identifying, Chest X-rays are widely used for diagnosis of pneumonia d...
In this paper, ResNet a Convolutional Neural Network for detecting and diagnosing the lung disease Covid-19 pneumonia infection automatically. For identifying, Chest X-rays are widely used for diagnosis of pneumonia disease which affects the lungs. This paper provides an approach to detect and diagnose Covid-19 pneumonia and classify the chest X-ray images into two classes either Covid-19 pneumonia or normal utilizing CNN. This is done by training the CNN to differentiate between the normal and pneumonia chest X-ray images using a deep learning platform Pytorch. Image preprocessing technique has been applied in order to enhance the image accuracy. Python and OpenCV have been used.
Phishing is a typical assault on unsuspecting individuals by making them to reveal their one-of-a-kind data utilizing fake sites. The target of phishing site URLs is to purloin the individual data like client name, pa...
Phishing is a typical assault on unsuspecting individuals by making them to reveal their one-of-a-kind data utilizing fake sites. The target of phishing site URLs is to purloin the individual data like client name, passwords and web based financial exchanges. Phishers utilize the sites which are outwardly and semantically like those genuine sites. As innovation keeps on developing, phishing strategies began to advance quickly and this should be forestalled by utilizing against phishing systems to recognize phishing. AI is a useful asset used to endeavor against phishing assaults. We as a whole know bunches of assaults are happening continuously situation in light of phishing URLS. There is no programmed procedure has been set up so far Multiple assaults of phishing URLs has not yet coordinated. In the proposed framework finding the phishing assaults/URLs, the System will identify various phishing assaults in equal succession and caution the ordinary clients with respect to phishing URLs.
Agitate Analysis is one of the overall utilized examination on Subscription Oriented Industries to break down client practices to anticipate the clients which are going to leave the help understanding from an organiza...
Agitate Analysis is one of the overall utilized examination on Subscription Oriented Industries to break down client practices to anticipate the clients which are going to leave the help understanding from an organization. It depends on Deep Learning techniques and calculations and become so significant for organizations in the present business conditions as acquiring another client's expense is more than holding the current ones. The paper audits the significant examinations on Customer Churn Analysis on Telecommunication Industry in writing to introduce general data to perusers about the regularly utilized information mining techniques utilized, results and execution of the strategies and revealing an insight to additional studies. To stay up with the latest, contemplates distributed in most recent five years and basically most recent two years have been incorporated.
This paper presents experimental results about the relationship between the Footprint Of Uncertainty (FOU) and the centroid of Interval Type-2 Fuzzy Numbers (IT2FN) which are a subclass of Type-2 fuzzy numbers. Four t...
详细信息
ISBN:
(数字)9781728169323
ISBN:
(纸本)9781728169330
This paper presents experimental results about the relationship between the Footprint Of Uncertainty (FOU) and the centroid of Interval Type-2 Fuzzy Numbers (IT2FN) which are a subclass of Type-2 fuzzy numbers. Four types of IT2FNs are analyzed: singleton-core triangular, interval-core triangular, singleton-core Gaussian and interval-core Gaussian IT2FNs. A quadratic relationship was detected, characterized, and their results are presented and discussed using numerical experiments.
作者:
C. JamunadeviMalathi EswaranB. RenukadeviS. PriyaB. VarnihaAssistant Professor (SrG)
Department of Computer Technology-PG Kongu Engineering College Perundurai Erode Tamil Nadu India Assistant Professor
Department of Computer Technology-PG Kongu Engineering College Perundurai Erode Tamil Nadu India Assistant Professor
Department of Information Technology Sri Sai Ram Engineering College Chennai Tamil Nadu India Assistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai Tamil Nadu India Student
Department of Computer Technology-PG Perundurai Kongu Engineering College Erode Tamil Nadu India
The 2019 novel Corona-virus infection spreads very quickly all over the world, many employers have decided to secure themselves as freelancers and to shift to remote work. The current system offers project outsourcing...
The 2019 novel Corona-virus infection spreads very quickly all over the world, many employers have decided to secure themselves as freelancers and to shift to remote work. The current system offers project outsourcing in a manual work. Hiring a Freelance Coder is designed to develop an interface for the organization and the freelancing professionals using responsive web design. This article highlights the project outsourcing through virtual environment there is no need of real physical meet up. The working flow of this website, The Company posts its project requirement to this application by the given category. The freelancer can search and view any project posted on this application and the freelancer can bid the project to outsource from the company. The entire bid details can be verified by the company and can approve the bid. The company can monitor the work status given by the freelancer and ask queries. The internship candidate can view the internship list and they can apply and send a resume. The present study was conducted during the month of December 2020, where questionnaires are formed and data collected using Google forms. Analysis of the data is made through Simple percentage method, Chi square test and ranking method. After analysis it found that the majority holding 31-40 age group of freelancers prefer online freelancing.
Many people download one or two files from the internet and it does not take ' much time to download them. What if there is a need for more number of files. For that problem RPA could be the solution. Robotic proc...
Many people download one or two files from the internet and it does not take ' much time to download them. What if there is a need for more number of files. For that problem RPA could be the solution. Robotic process automation (or RPA) is a form of business process automation technology based on metaphorical software robots (bots) or on artificial intelligence (AI)/digital workers. The main objective of this paper is to download 100 random pdf files from the internet using excel, csv and datatable automations in Uipath and compare them with the manual way of downloading and finding the most efficient way of downloading the large number of files.
暂无评论