In order to overcome defects resulted from replacing the photo background color, an improved method is proposed for background replacement. The α-values in the alpha matte are transformed to enhance the details in th...
详细信息
Single-sample face and ear recognition is a challenging problem in biometrics due to the fact that only a single face or ear image sample is available for the training. However, during the recognition, test images may...
详细信息
this paper explores diverse sentiment evaluation algorithms used inside the automated monitoring of strength technology. Unique algorithms such as Naive Bayes, guide Vector Machines, Conditional Random Fields, and RNN...
详细信息
Reinforcement getting to know (RL) has emerged as an ability method to deal with electricity green supply chains and improve the sustainability of operations. This paper critiques the software of RL in supply chain ma...
详细信息
Event Factuality Detection (EFD) task determines the factuality of textual events, i.e., classifying whether an event is a fact, possibility, or impossibility, which is essential for faithfully understanding and utili...
详细信息
Medicinal plants have a long tradition of being cultivated and harvested in India. The Indian Forest is the principal repository for many useful medicinal herbs. As a result of their critical role in maintaining peopl...
详细信息
Today all humankind is willing to avail more facilities and hopes everything should be available with a click of the button. In order to offer different services, the developers have come with inbuilt modules of sever...
详细信息
Today all humankind is willing to avail more facilities and hopes everything should be available with a click of the button. In order to offer different services, the developers have come with inbuilt modules of several systems. This make easy system develoment and services may be offered intantly. These services are connected to the internet and accessible via Android phones and IoT devices. But this inbuilt module suffers from a lot of vulnerabilities, bugs, and default settings which may be difficult to change, as happened at the time of changing the password of home-based Wi-Fi router, which require external applications and OTP verifications, etc. Due to these issues and new hacking tools and techniques, security is a major challenge today. The basic framework to provide adequate security of the system comprises five following principles: integrity, confidentiality, availability, privacy, and nonrepudiation. The attacker may leverage advantage of any shortcomings that may lead to several issues. This work explores the cause of threads/vulnerability particularly for IoT, IIoT, SCADA, and Android application systems. The structure of this work is divided in different sections like, a short introduction to Malware, how it infects the system, and a detailed malware exploitation plan that is generally followed by expert attackers to exploit the vulnerabilities related to critical infrastructure or to defame the organization or countries is presented. In addition, General framework based introduction on IoT and Android is also presented with common vulnerabilities at every stage and respective mitigation strategies. Both static and dynamic analyses are evaluated in this work. It is identified that, for a better model design and evaluation, both are highly recommended for the implementation of effective malware detection strategies. Along with these models in order to protect the infra-structure Honeynet, IDS, IPS, Hardware-based securities like CPU and Memory and for
The main task of this work is to establish the consumption of energy from renewable sources such as solar and wind energy for the production of such a combustible substance as hydrogen, and further optimal calculation...
详细信息
With the development and application of internet and information communication technology, countries around the world have invested heavily in the space industry in recent years, with particular emphasis on the deploy...
详细信息
Linear optimization algorithms are an effective method of designing broadband antennas. Specifically, those algorithms can be used to satisfy more than one layout target that can vary from synthesizing a sample or sha...
详细信息
暂无评论