This research paper addresses the enhancement of data security and privacy in cloud storage through diverse encryption methods, such as one-to-many encryption, data integrity, resilient data deletion, and privacy-pres...
详细信息
We aim to simplify and optimize the process of generating Hindi captions for visual content using deep learning models. With the advancements in deep learning, generating textual descriptions for images is now possibl...
详细信息
To enhance the capabilities of advanced video coding for emerging applications, the AVS3 standard has been introduced to double the coding efficiency compared to its predecessor, the AVS2 standard. It incorporates sop...
详细信息
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over t...
详细信息
ISBN:
(纸本)9798350352931
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over the last decade, the number of these computing systems - including desktops, laptops, smartphones, and the Internet of Things (IoT) - has skyrocketed. Among them, cell phones are practically integral to modern life. The popularity of web-based assaults has skyrocketed with the exponential growth in the number of individuals using the Internet. These web-based assaults are increasingly being combatted by security corporations. Unfortunately, new forms of these assaults are appearing all the time, making it hard for older security measures to stay up. Artificial intelligence (AI) is a source of optimism in the current cybersecurity landscape, offering a potential solution to the ever-changing digital dangers. The fast development of AI over the last decade has given rise to this optimism, because it is now impacting the expansion of every industry. With AI bringing so many advantages in every field, online security is one sector that just cannot afford to ignore it. This planned effort's work represents an advance in that direction. Critical online security issues have been the focus of this proposed work's study, which aims to address these issues using AI. Web security issues for desktop and mobile devices have been addressed in the proposed work. The planned work's contributions to online security are as follows: The 'MalCrawler' web crawler is a targeted tool for finding and exploring the web. This crawler makes it easy to gather websites, particularly ones that are harmful. It does a better job of collecting dangerous websites than a typical crawler. Additionally, it is built to circumvent the evasion strategies used by rogue websites. The crawler's ability to gather webpages - particularly dangerous ones - in order to provide datasets for ML-based an
Requirements form the basis for defining software systems’ obligations and tasks. Testable requirements help prevent failures, reduce maintenance costs, and make it easier to perform acceptance tests. However, despit...
详细信息
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the *** fundamental problem with WSN is that it has afinite *** a network is a common strategy for increasing the life-time of WSNs an...
详细信息
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the *** fundamental problem with WSN is that it has afinite *** a network is a common strategy for increasing the life-time of WSNs and,as a result,allowing for faster data *** cluster-ing algorithm’s goal is to select the best cluster head(CH).In the existing system,Hybrid grey wolf sunflower optimization algorithm(HGWSFO)and optimal clus-ter head selection method is *** does not provide better competence and out-put in the ***,the proposed Hybrid Grey Wolf Ant Colony Optimisation(HGWACO)algorithm is used for reducing the energy utilization and enhances the lifespan of the *** hole method is used for selecting the cluster heads(CHs).The ant colony optimization(ACO)technique is used tofind the route among origin CH and *** open cache of nodes,trans-mission power,and proximity are used to improve the CH *** grey wolf optimisation(GWO)technique is the most recent and well-known optimiser module which deals with grey wolves’hunting activity(GWs).These GWs have the ability to track down and encircle *** GWO method was inspired by this hunting *** proposed HGWACO improves the duration of the net-work,minimizes the power consumption,also it works with the large-scale *** HGWACO method achieves 25.64%of residual energy,25.64%of alive nodes,40.65%of dead nodes also it enhances the lifetime of the network.
Eduverse is an advanced Virtual Reality (VR) platform developed to transform traditional education by creating interactive and immersive virtual learning environments. Designed to support both students and teachers, E...
详细信息
The study highlights the importance of facial landmark trajectories in understanding mental health by investigating the application of supervised learning systems to identify emotions. Diagnoses and treatment plans ar...
详细信息
Recently, neural network-based inverse models have been used for multi-objective optimization. The basic idea is to approximate the mapping from the Pareto front to the Pareto set. In general, inverse modeling from a ...
详细信息
Monocular depth estimation (MDE) is an important task in computer vision, it enables a range of applications like robotic navigation, augmented reality and also used in surgical guidance. This paper shows the use of V...
详细信息
暂无评论