Technological advancements have brought a new era of growth for the healthcare industry. Nowadays, the security of healthcare data and the preservation of user privacy inside smart healthcare systems are being severel...
详细信息
Intrusion Detection and Prevention Systems (IDPS) play a key role in protecting networks by keeping an eye out for suspicious activity, spotting threats, and taking action to stop them. These systems were originally d...
详细信息
Intrusion Detection and Prevention Systems (IDPS) play a key role in protecting networks by keeping an eye out for suspicious activity, spotting threats, and taking action to stop them. These systems were originally designed for traditional, fixed networks, but they struggle to keep up with the fast-paced and constantly changing nature of cloud computing environments. Cloud computing has revolutionized technology, bringing many innovations in how organizations operate. Organizations rely heavily on the use of cloud storage to store and retrieve their sensitive data. Security issues in the cloud computing environment are a big challenge as, despite various protection measures, the cloud environment is vulnerable to security threats. Intrusion Detection and Prevention System (IDPS) is a significant component in securing the cloud environment against emerging threats in cyber-attacks. This paper takes a close look at intrusion detection systems (IDS) that are specifically built for cloud computing. The cloud brings its own set of challenges like constantly changing resources, sharing space between many users, and limited visibility into all the network traffic. Unlike traditional IDS that work in fixed, local networks, cloud-based IDS have to handle traffic that moves between virtual machines and scale up or down quickly. Cloud computing has transformed over time, improving access to scalability while offering vulnerabilities that increase the probability of intrusion or attacks. This review addresses these research gaps by comprehensively surveying state-of-the-art IDPS techniques tailored for cloud computing environments. IDPS is further classified into different categories, such as signature-based, anomaly-based, and hybrid-based. Recently, combining Machine Learning (ML) and Deep Learning (DL) with Intrusion Detection Systems (IDS) has shown to be very effective, as it allows for more precise detection and large-scale use. However, notable challenges include small
Globally, skin diseases are emerging as the most common health problem. It initiates depressive disorder, and it also causes physical health distress. It rarely led to skin cancer in extreme cases. Diagnosing skin dis...
详细信息
Modernization and intense industrialization have led to a substantial improvement in people’s quality of life. However, the aspiration for achieving an improved quality of life results in environmental contamination....
详细信息
Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. Lic...
详细信息
Sign language serves as a vital mode of communication for the deaf and hard of hearing community, yet access to sign language content remains limited due to the lack of accurate and timely captioning. In this paper, a...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to t...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being *** study presents a novel framework for generating animatable 3D cartoon faces from a single portrait *** First,we transferred an input real-world portrait to a stylized cartoon image using *** then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed *** two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark ***,we proposed a semantic-preserving face-rigging method based on manually created templates and deformation *** Compared with prior arts,the qualitative and quantitative results show that our method achieves better accuracy,aesthetics,and similarity ***,we demonstrated the capability of the proposed 3D model for real-time facial animation.
This study develops a cutting-edge framework for detecting phishing attacks, leveraging the synergy between natural language processing and advanced deep learning. It begins with a comprehensive dataset and advances t...
详细信息
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M...
详细信息
Digital pathology employing Whole Slide Images (WSIs) plays a pivotal role in cancer detection. Nevertheless, the manual examination of WSIs for the identification of various tissue regions presents formidable challen...
详细信息
暂无评论