In this paper, we present the Rollick Games platform and its Pervasive Game Modeling Language that enables the description of location-based pervasive games using a GUI provided by the Game Studio web app. The runtime...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
We advocate a joint combined trend sentiment categorization method to guide sentiment classifiers for a couple of tweets at the same time. Distinctively, putrefy the sentiment classifier of all trends linked to two ad...
详细信息
This research explores the challenge of distinguishing between authentic and AI-generated images using advanced convolutional neural network (CNN) architectures. Leveraging the CIFAKE dataset, which includes a diverse...
详细信息
Twi is a dialect of the Akan language spoken in southern and central Ghana by several million people. About 80% of the Ghanaian population speaks Twi as a first or second language. Summarization is a basic natural lan...
详细信息
One of the dangerous disease pneumonia, which can affect one or both lungs, is frequently brought on by viruses, fungi or bacteria. Radiotherapists with advanced training are required to evaluate chest X-rays used to ...
详细信息
In this paper, we focus on the edge server placement problem (ESPP). ESPP is to decide positions (edge stations) where purchased edge servers (ESs) are placed when a service provider builds or upgrades its edge comput...
详细信息
Resilient speech separation in multi-talker situations remains a challenge, particularly in real-time and low latency applications. Modern speech separation systems strive to separate loud, reverberant voice mixes, es...
详细信息
This research paper introduces an innovative Neural Machine Translation (NMT) model designed to accurately translate causative English sentences into Malayalam. The study comprehensively explores the various forms of ...
详细信息
Business executives are developing cutting-edge digital solutions as the virus outbreak spreads. A face mask detection system is one of them, and it can be used to spot people wearing them. Face mask identification so...
详细信息
暂无评论