Online social networks (OSN) have become extremely popular in the past few decades. Prominent OSN companies, such as Facebook and Twitter, control a huge amount of information on its users as well as interactions that...
详细信息
Cloud computing provides services that use more internet resources as needed. This helps users because it’s easy to use and affordable. But, when important apps and private data are moved to shared clouds, there can ...
详细信息
Cardiovascular disease (CVD), ahead of all other causes of death worldwide in this era. There is an immediate need for accurate, reliable, and practically applicable ways of early detection and treatment of diseases, ...
详细信息
In recent years epileptic seizures have become a major impact on large number of people worldwide. Over 60 million people have been affected globally due to this neurological condition. These seizures are caused by ex...
详细信息
Graphical Password Authentication is an emerging and advanced technique in password authentication for hypothesis that provides a stronger and more secure password compared to the traditional text password, which is t...
详细信息
In the fast-changing e-commerce world, personalization with regard to increasing user engagement and driving sales is becoming essential. As products and interactions grow voluminous, traditional recommender systems s...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security of the *** intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system *** this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot *** this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant *** proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO *** results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness *** a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.
Segmentation of Spine with the 2 - Stage Semantic framework involves the Vertebrae and the Inter-vertebral discs components of the spine, helps in the identification of the spinal disorders. The methods using the Conv...
详细信息
According to the World Health Organization, at least 2.2 billion people have impaired vision. It is crucial to note that in at least 1 billion of these cases, vision impairment could have been prevented or is yet to b...
详细信息
The need for sophisticated detection and response systems to counteract cyber threats has grown in importance as the cybersecurity landscape changes. In order to improve cyberattack detection and response, this study ...
详细信息
暂无评论