This paper provides an overview, presents the work-in-progress study of how software architecture can be modernized using the latest technologies. We will discuss the reasons why software modernization is required, ho...
详细信息
Alzheimer's disease (AD) is a significant global health concern, accounting for the sixth highest cause of mortality worldwide. Early diagnosis is critical to improving patient care and treatment outcomes. This st...
详细信息
This research aims to compare the effectiveness of two prominent digital forensics tools, Autopsy TSK and Forensic Explorer, in analysing a well-known forensic image, specifically the Lone Wolf image from Digital Corp...
详细信息
ISBN:
(数字)9798350382693
ISBN:
(纸本)9798350382709
This research aims to compare the effectiveness of two prominent digital forensics tools, Autopsy TSK and Forensic Explorer, in analysing a well-known forensic image, specifically the Lone Wolf image from Digital Corpora. The aim is to assess their capabilities in detecting and handling forensic artefacts and their responses to selected anti-forensic techniques. Autopsy TSK and Forensic Explorer exhibited robust performance in identifying and analysing forensic artefacts within the Lone Wolf image. They successfully retrieved most of the available digital evidence. Data was concealed using encryption techniques, both tools failed to detect the hidden information, highlighting a limitation in their ability to uncover encrypted steganographic content. In cases of altered Exif and metadata, both tools could retrieve the original information from the hex data of the files. However, it is noteworthy that neither tool provided an alert or warning to guide the investigator regarding potential data manipulation. Based on the findings of this research, it is advisable for digital forensic investigators to exercise caution and employ additional techniques or tools when handling cases which may involve encrypted steganography.
The accelerated technological growth majorly influencing our everyday lives, Internet of Things (IoT) has been a trending topic and current interest in the contemporary world. IoT has benefited in revolutionising life...
详细信息
Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and *** of them is a sensor network with embedded ...
详细信息
Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and *** of them is a sensor network with embedded sensors working as the primary nodes,termed Wireless Sensor Networks(WSNs),in which numerous sensors are connected to at least one Base Station(BS).These sensors gather information from the environment and transmit it to a BS or gathering *** have several challenges,including throughput,energy usage,and network lifetime *** strategies have been applied to get over these *** may,therefore,be thought of as the best way to solve such ***,it is crucial to analyze effective Cluster Head(CH)selection to maximize efficiency throughput,extend the network lifetime,and minimize energy *** paper proposed an Accelerated Particle Swarm Optimization(APSO)algorithm based on the Low Energy Adaptive Clustering Hierarchy(LEACH),Neighboring Based Energy Efficient Routing(NBEER),Cooperative Energy Efficient Routing(CEER),and Cooperative Relay Neighboring Based Energy Efficient Routing(CR-NBEER)*** the help of APSO in the implementation of the WSN,the main methodology of this article has taken *** simulation findings in this study demonstrated that the suggested approach uses less energy,with respective energy consumption ranges of 0.1441 to 0.013 for 5 CH,1.003 to 0.0521 for 10 CH,and 0.1734 to 0.0911 for 15 *** sending packets ratio was also raised for all three CH selection scenarios,increasing from 659 to *** number of dead nodes likewise dropped for the given combination,falling between 71 and *** network lifetime was deemed to have risen based on the results found.A hybrid with a few valuable parameters can further improve the suggested APSO-based *** to underwater,WSN can make use of the proposed *** overall results have been evaluated and
The core focus of this research work is to obtain invariant solutions and conservation laws of the (3+1)-dimensional Zakharov–Kuznetsov (ZK) equation which describes the phenomenon of wave stability and solitons prop...
详细信息
The increase of connected devices on the Internet of Things has raised significant concerns related to data security, privacy, and network integrity. In response to these challenges, our paper brings a holistic projec...
详细信息
ISBN:
(数字)9798350349450
ISBN:
(纸本)9798350349467
The increase of connected devices on the Internet of Things has raised significant concerns related to data security, privacy, and network integrity. In response to these challenges, our paper brings a holistic project aimed at developing a solution. Our innovative solution CyberGuard Pi integrates multiple key functionalities to addresses the concerns. The CyberGuard Pi device incorporates Pi-hole for efficient ad blocking, providing users with a positive online experience while minimizing security risks associated with malicious advertisements. To bolster user privacy, a Virtual Private Network is implemented, safeguarding data transmission and protecting against potential threats. Furthermore, the CyberGuard Pi features robust network monitoring and scanning capabilities, offering real-time insights into network activities within the local LAN area. An Intrusion Detection System is integrated to identify and mitigate potential threats, ensuring the integrity of the IoT ecosystem. To facilitate seamless and secure data storage, our CyberGuard pi comes with a Network-Attached Storage cloud system enabling users to store and retrieve data with ease. This component enhances data security concerns associated with traditional storage methods. Our CyberGuard Pi represents a comprehensive approach to address network security challenges posed by the growing number of connected devices by combining ad blocking, VPN, network monitoring, intrusion detection, and cloud-based storage functionalities.
the development of computerized strategies for item-orientated image evaluation in Hyper Spectral photos (HSI), an emerging field of applying machine-gaining knowledge of synthetic intelligence, has ended up an increa...
详细信息
Learning analytics is the process of collecting data on learners and their environment, analyzing it, and using those insights to improve learning experiences and outcomes. Analysis will help teachers identify student...
详细信息
ISBN:
(数字)9798331542573
ISBN:
(纸本)9798331542580
Learning analytics is the process of collecting data on learners and their environment, analyzing it, and using those insights to improve learning experiences and outcomes. Analysis will help teachers identify students who might need extra help early on. Also, courses can be tailored to individual learning styles and the entire learning environment can be fine-tuned for better results. A multiple linear regression model is presented here in this work to predict students' Final Exam grades from internal assessment scores. In this case, the response variable is the student's score in the Final Exam, while the assessment components, such as Quiz, Midterm, and SCL, are predictor variables. The data were collected from a group of students who studied Probability Statistics course at the advanced diploma level program. A regression model was created using R software in this study, accompanied by graphical representations and tables to demonstrate the model.
Recurrent Neural Networks (RNNs) are a modern-day state-of-the-art algorithm that is brand new modern getting used for clinical picture segmentation. RNNs are, in particular, nicely applicable for this undertaking due...
详细信息
暂无评论