This study aims to explore the feasibility and effectiveness of applying Fuzzy Theory to the risk assessment of Human Immunodeficiency Virus (HIV) infection. In recent years, the global number of infections has rapidl...
详细信息
This paper presents an autoencoder-based neural network architecture to compress histopathological images while retaining the denser and more meaningful representation of the original images. Current research into imp...
详细信息
The rise of fake job postings in online job marketplaces presents a significant challenge for job seekers, necessitating robust detection methods. Existing methods often struggle to adapt to evolving fraudulent tactic...
详细信息
Today all humankind is willing to avail more facilities and hopes everything should be available with a click of the button. In order to offer different services, the developers have come with inbuilt modules of sever...
详细信息
Today all humankind is willing to avail more facilities and hopes everything should be available with a click of the button. In order to offer different services, the developers have come with inbuilt modules of several systems. This make easy system develoment and services may be offered intantly. These services are connected to the internet and accessible via Android phones and IoT devices. But this inbuilt module suffers from a lot of vulnerabilities, bugs, and default settings which may be difficult to change, as happened at the time of changing the password of home-based Wi-Fi router, which require external applications and OTP verifications, etc. Due to these issues and new hacking tools and techniques, security is a major challenge today. The basic framework to provide adequate security of the system comprises five following principles: integrity, confidentiality, availability, privacy, and nonrepudiation. The attacker may leverage advantage of any shortcomings that may lead to several issues. This work explores the cause of threads/vulnerability particularly for IoT, IIoT, SCADA, and Android application systems. The structure of this work is divided in different sections like, a short introduction to Malware, how it infects the system, and a detailed malware exploitation plan that is generally followed by expert attackers to exploit the vulnerabilities related to critical infrastructure or to defame the organization or countries is presented. In addition, General framework based introduction on IoT and Android is also presented with common vulnerabilities at every stage and respective mitigation strategies. Both static and dynamic analyses are evaluated in this work. It is identified that, for a better model design and evaluation, both are highly recommended for the implementation of effective malware detection strategies. Along with these models in order to protect the infra-structure Honeynet, IDS, IPS, Hardware-based securities like CPU and Memory and for
One of India's main crops, maize, accounts for 2-3% of global production. Disease detection in maize fields has become increasingly difficult due to a lack of knowledge about disease symptoms. Furthermore, manual ...
详细信息
In an effort to address the challenges of menstrual hygiene management in developing countries, a portable sanitary pad vending machine was developed. The vending machine is powered by an Arduino Uno microcontroller a...
详细信息
This research focuses on developing a screw detection system using Yolo series object detection models and the OpenCV module. The plan uses a camera to detect and identify different types of screws on various producti...
详细信息
This study investigates means of enhancing the accuracy of Automated Speech Recognition (ASR) systems for the Bahraini dialect, a variant that has received minimal attention in natural language processing research. Th...
详细信息
The growing reliance on cloud services necessitates a heightened focus on security measures to protect the integrity and privacy of crucial business data. Privacy preservation techniques, incorporating cryptographic a...
详细信息
Boosting and bagging are famous ensembles gaining knowledge of algorithms for photo classes. Each algorithm depends upon combining a couple of classifiers to enhance generalization accuracy, at the same time as using ...
详细信息
暂无评论