Optical character recognition is a way of converting scanned images of printed or handwritten documents into machine-encoded text, making it easier to store, browse, retrieve, and process electronic data. In this rese...
详细信息
In the present optical fog/cloud computing environment, optical line terminals and optical network units are used as the most promising optical fog devices (OFDs). The inherent characteristics of fog computing provide...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
In the era of digital transformation, the hospitality industry faces unique challenges and opportunities. With travellers increasingly relying on online reviews to make informed decisions, the role of sentiment analys...
详细信息
The use of programming online judges(POJs)has risen dramatically in recent years,owing to the fact that the auto-evaluation of codes during practice motivates students to learn *** POJs have greater number of pro-gram...
详细信息
The use of programming online judges(POJs)has risen dramatically in recent years,owing to the fact that the auto-evaluation of codes during practice motivates students to learn *** POJs have greater number of pro-gramming problems in their repository,learners experience information *** systems are a common solution to information *** recommender systems used in e-learning platforms are inadequate for POJ since recommendations should consider learners’current context,like learning goals and current skill level(topic knowledge and difficulty level).To overcome the issue,we propose a context-aware practice problem recommender system based on learners’skill level navigation *** system initially performs skill level navigation pattern mining to discover frequent skill level navigations in the POJ and tofind learners’learning ***filtering(CF)and con-tent-basedfiltering approaches are employed to recommend problems in the cur-rent and next skill levels based on frequent skill level navigation *** sequence similarity measure is used tofind the top k neighbors based on the sequence of problems solved by the *** experiment results based on the real-world POJ dataset show that our approach considering the learners’cur-rent skill level and learning goals outperforms the other approaches in practice problem recommender systems.
Mental health challenges are growing in recent years, emphasizing the need for effective monitoring and inter- vention systems. This paper presents a comprehensive approach to detect mental unstabilities by analyzing ...
详细信息
Handwritten text recognition software is used to recognize and extract text from scanned documents. The fun-damental goal of this technology is to transform printed or handwritten text into an easily readable electron...
详细信息
The Internet of Things (IoT) is a significant technological advancement that uses the internet to enable seamless communication between various devices, allowing people and objects to connect anytime and from anywhere...
详细信息
From the past few years, Cyber-Physical Systems (CPS) have rapidly evolved in various sectors by integrating computing, networking, and physical processes. CPS facilitates the management of critical infrastructure suc...
详细信息
Cab booking services help people order taxis. Existing cab booking services use client server-based architecture. The paper gives a study of the architecture and workings of the Uber cab booking website (Dissanayake, ...
详细信息
暂无评论