Healthcare is a fundamental part of every individual’s *** healthcare industry is developing very rapidly with the help of advanced *** researchers are trying to build cloud-based healthcare applications that can be ...
详细信息
Healthcare is a fundamental part of every individual’s *** healthcare industry is developing very rapidly with the help of advanced *** researchers are trying to build cloud-based healthcare applications that can be accessed by healthcare professionals from their premises,as well as by patients from their mobile devices through communication *** systems promote reliable and remote interactions between patients and healthcare ***,there are several limitations to these innovative cloud computing-based systems,namely network availability,latency,battery life and resource *** propose a hybrid mobile cloud computing(HMCC)architecture to address these ***,we also evaluate the performance of heuristic and dynamic machine learning based task scheduling and load balancing algorithms on our proposed *** compare them,to identify the strengths and weaknesses of each algorithm;and provide their comparative results,to show latency and energy consumption *** issues for cloudbased healthcare systems are discussed in detail.
Aspect-based sentiment analysis (ABSA) is a natural language processing (NLP) technique to determine the various sentiments of a customer in a single comment regarding different aspects. The increasing online data con...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving sophistication of cyber *** paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack *** approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in *** demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant ***,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time *** for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current *** innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
Conventional machine learning methods for software effort estimation (SEE) have seen an increase in research interest. Conversely, there are few research that try to evaluate how well deep learning techniques work in ...
详细信息
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method ...
详细信息
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method for the right treatment for dermoscopic clinical features such as lesion borders,pigment networks,and the color of *** challenges are required an automated system to classify the clinical features of melanoma and non-melanoma *** trained clinicians can overcome the issues such as low contrast,lesions varying in size,color,and the existence of several objects like hair,reflections,air bubbles,and oils on almost all *** contour is one of the suitable methods with some drawbacks for the segmentation of irre-gular *** entropy and morphology-based automated mask selection is pro-posed for the active contour *** proposed method can improve the overall segmentation along with the boundary of melanoma *** this study,features have been extracted to perform the classification on different texture scales like Gray level co-occurrence matrix(GLCM)and Local binary pattern(LBP).When four different moments pull out in six different color spaces like HSV,Lin RGB,YIQ,YCbCr,XYZ,and CIE L*a*b then global information from different colors channels have been ***,hybrid fused texture features;such as local,color feature as global,shape features,and Artificial neural network(ANN)as classifiers have been proposed for the categorization of the malignant and *** had been carried out on datasets Dermis,DermQuest,and *** results of our advanced method showed super-iority and contrast with the existing state-of-the-art techniques.
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control *** on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and ***,many security protocols have been presented to offer privacy and security ***,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information *** last attack can be launched upon adversarial physical capture of these *** addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high *** this paper,an authentication protocol based on lightweight quadratic residues and hash functions is *** formal security analysis is executed using the widely deployed random oracle *** addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat *** terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related ***,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage *** overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.
Video surveillance is widely adopted across various sectors for purposes such as law enforcement, COVID-19 isolation monitoring, and analyzing crowds for potential threats like flash mobs or violence. The vast amount ...
详细信息
GPT-4 (Generative Pre-Trained Transformer 4) is often heralded as a leading commercial AI offering, sparking debates over its potential as a steppingstone toward Artificial General Intelligence. But does it possess co...
详细信息
Wireless Ad Hoc Networks consist of devices that are wirelessly *** Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc *** is used in wireless ...
详细信息
Wireless Ad Hoc Networks consist of devices that are wirelessly *** Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc *** is used in wireless ad hoc *** is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined *** fetches data from a fixed *** redundancy,mobility,and location dependency are the main issues of the IP network *** these factors result in poor performance of wireless ad hoc *** main disadvantage of IP is that,it does not provide in-network ***,there is a need to move towards a new network that overcomes these *** Data Network(NDN)is a network that overcomes these *** is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user *** NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and *** considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless *** cachingmechanism-based results are also *** the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks.
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict softwa...
详细信息
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict software bugs,but a more precise and general approach is *** bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning ***,these studies are not generalized and efficient when extended to other ***,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification *** methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a *** National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were *** reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode.
暂无评论