This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
Wearable technology is expanding rapidly in recent year. It is used in many applications in various domains, including affective computing. Affective computing is all about understanding and responding to human emotio...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** computing has traditionally played an important role in establishing ***,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic ***,IoT networks are vulnerable to unwanted assaults because of their open and shared *** a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is *** this study,we examined the time-related aspects of network traffic *** presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark *** showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score.
Efficient waste management together with certain measures to promote the recycling process are essential for over-coming global environmental issues. In this study, we describe Repro an app, which is targeted at trans...
详细信息
Deep neural networks (DNNs) possess potent feature learning capability, enabling them to comprehend natural language, which strongly support developing dialogue systems. However, dialogue systems usually perform incor...
详细信息
Wireless sensor network is a rapidly growing and challenging field as they are constrained by energy utilization, computation cost, network capacity, and security. Hence conventional network security schemes cannot be...
详细信息
In educational institutes, efficient timetable generation is critical for optimizing resource utilization and fostering a conducive learning environment. Timetable challenges, such as clashes among faculty schedules a...
详细信息
To address the low-voltage, high-current requirements in hydrogen production applications, a virtual 48-pulse three-phase rectifier is proposed, and achieves the equivalent performance of four parallel 12-pulse rectif...
详细信息
The enormous variations in food choices and lifestyle in today’s world have given rise to the demand of using recommender system as a suitable tool in making appropriate food choices. Need for choosing nutritious foo...
详细信息
暂无评论