In this day and age, corporations are moving towards data driven decision making. They are utilizing data to make applications that can assist them with business intelligence. Data assists them with working on their e...
详细信息
Increasing experimental evidence has shown that circRNA has the potential to serve as a biomarker for disease diagnosis and prognosis, especially in cancer [1]. circ RNA actively participates in numerous pathological ...
详细信息
Increasing experimental evidence has shown that circRNA has the potential to serve as a biomarker for disease diagnosis and prognosis, especially in cancer [1]. circ RNA actively participates in numerous pathological processes by serving as an miRNA sponge. Consequently, the precise prediction of circRNA-miRNA interactions(CMIs) is crucial for narrowing down the scope of biological experiments and expediting the research and development of disease treatments.
A deep learning network is super-efficient for image processing. The artificial brain of the deep learning system is highly capable of solving the categorization of problems. However, deep learning has several restric...
详细信息
With the widespread adoption of Android and its applications, obfuscated malware poses significant challenges to the platform's security. Addressing these challenges requires automated, lightweight, and scalable m...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can ha...
详细信息
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can hamper the performance of IoT-enabled cloud ***,efficient task scheduling can lower the cloud infrastructure’s energy consumption,thus maximizing the service provider’s revenue by decreasing user job processing *** proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm(MCWOA),combines elements of the Chimp Optimization Algorithm(COA)and the Whale Optimization Algorithm(WOA).To enhance MCWOA’s identification precision,the Sobol sequence is used in the population initialization phase,ensuring an even distribution of the population across the solution ***,the traditional MCWOA’s local search capabilities are augmented by incorporating the whale optimization algorithm’s bubble-net hunting and random search mechanisms into MCWOA’s position-updating *** study demonstrates the effectiveness of the proposed approach using a two-story rigid frame and a simply supported beam *** outcomes reveal that the new method outperforms the original MCWOA,especially in multi-damage detection *** excels in avoiding false positives and enhancing computational speed,making it an optimal choice for structural damage *** efficiency of the proposed MCWOA is assessed against metrics such as energy usage,computational expense,task duration,and *** simulated data indicates that the new MCWOA outpaces other methods across all *** study also references the Whale Optimization Algorithm(WOA),Chimp Algorithm(CA),Ant Lion Optimizer(ALO),Genetic Algorithm(GA)and Grey Wolf Optimizer(GWO).
Chatbots use artificial intelligence (AI) and natural language processing (NLP) algorithms to construct a clever system. By copying human connections in the most helpful way possi-ble, chatbots emulate individuals and...
详细信息
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is...
详细信息
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is *** convolutional neural networks,renowned for their independence in feature extraction,have established their value in numerous detection and classification ***,it requires large training datasets and several parameters that need careful *** proposed Modified Dense Convolutional Network(MDCN)provides a successful classification scheme for plant diseases affecting mango *** model employs the strength of pre-trained networks and modifies them for the particular context of mango leaf diseases by incorporating transfer learning *** data loader also builds mini-batches for training the models to reduce training ***,optimization approaches help increase the overall model’s efficiency and lower computing *** employed on the MangoLeafBD Dataset consists of a total of 4,000 *** the experimental results,the proposed system is compared with existing techniques and it is clear that the proposed algorithm surpasses the existing algorithms by achieving high performance and overall throughput.
暂无评论