The proliferation of distributed networks and the increasing demand for remote collaboration and maintenance have highlighted the need for secure and controlled remote access solutions. This paper presents a novel app...
详细信息
Mental Illnesses such as Anxiety and Depression are fairly prevalent in modern society. Yet most people do not get diagnosed, cannot afford treatment, or there simply aren’t any readily available practitioners. In th...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
Blockchain technology has the capability to handle information in a decentralized, permanent, transparent, and secure manner, which makes it unique. The data of the vaccine supply chain is maintained either manually o...
详细信息
Visual Question Answering (VQA) system represents an essential usage of computer vision and natural language processing, enabling machines to understand and react to inquiries about images. This study outlines the arc...
详细信息
Traditional Wireless Sensor Networks(WSNs)comprise of costeffective sensors that can send physical parameters of the target environment to an intended *** the evolution of technology,multimedia sensor nodes have becom...
详细信息
Traditional Wireless Sensor Networks(WSNs)comprise of costeffective sensors that can send physical parameters of the target environment to an intended *** the evolution of technology,multimedia sensor nodes have become the hot research topic since it can continue gathering multimedia content and scalar from the target *** existence of multimedia sensors,integrated with effective signal processing and multimedia source coding approaches,has led to the increased application of Wireless Multimedia Sensor Network(WMSN).This sort of network has the potential to capture,transmit,and receive multimedia *** energy is a major source in WMSN,novel clustering approaches are essential to deal with adaptive topologies of WMSN and prolonged network *** this motivation,the current study develops an Enhanced Spider Monkey Optimization-based Energy-Aware Clustering Scheme(ESMO-EACS)for *** proposed ESMO-EACS model derives ESMO algorithm by incorporating the concepts of SMO algorithm and quantum *** proposed ESMO-EACS model involves the design of fitness functions using distinct input parameters for effective construction of clusters.A comprehensive experimental analysis was conducted to validate the effectiveness of the proposed ESMO-EACS technique in terms of different performance *** simulation outcome established the superiority of the proposed ESMO-EACS technique to other methods under various measures.
Histopathology is the investigation of tissues to identify the symptom of *** histopathological procedure comprises gathering samples of cells/tissues,setting them on the microscopic slides,and staining *** investigat...
详细信息
Histopathology is the investigation of tissues to identify the symptom of *** histopathological procedure comprises gathering samples of cells/tissues,setting them on the microscopic slides,and staining *** investigation of the histopathological image is a problematic and laborious process that necessitates the expert’s *** the same time,deep learning(DL)techniques are able to derive features,extract data,and learn advanced abstract data *** this view,this paper presents an ensemble of handcrafted with deep learning enabled histopathological image classification(EHCDL-HIC)*** proposed EHCDLHIC technique initially performs Weiner filtering based noise removal *** the images get smoothened,an ensemble of deep features and local binary pattern(LBP)features are *** the classification process,the bidirectional gated recurrent unit(BGRU)model can be *** the final stage,the bacterial foraging optimization(BFO)algorithm is utilized for optimal hyperparameter tuning process which leads to improved classification performance,shows the novelty of the *** validating the enhanced execution of the proposed EHCDL-HIC method,a set of simulations is *** experimentation outcomes highlighted the betterment of the EHCDL-HIC approach over the existing techniques with maximum accuracy of 94.78%.Therefore,the EHCDL-HIC model can be applied as an effective approach for histopathological image classification.
Water resource management worldwide faces significant challenges, including high consumption rates, scarcity, and ageing infrastructure. This paper proposes a comprehensive approach to address these issues through fiv...
详细信息
Prompting techniques have significantly enhanced the capabilities of Large Language Models (LLMs) across various complex tasks, including reasoning, planning, and solving math word problems. However, most research has...
详细信息
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int...
详细信息
暂无评论