Web-based applications are now the preferred approach for delivering a variety of services via the Internet. As a result of the globalization of commerce, web applications have been growing quickly and becoming increa...
详细信息
Web-based applications are now the preferred approach for delivering a variety of services via the Internet. As a result of the globalization of commerce, web applications have been growing quickly and becoming increa...
Web-based applications are now the preferred approach for delivering a variety of services via the Internet. As a result of the globalization of commerce, web applications have been growing quickly and becoming increasingly complicated. Such applications have a significant security vulnerability in the online environment since they were developed with little experience and without testing or validation. Numerous attackers use this security vulnerability to take control of the program, modify the data, and steal the most crucial information. They may also access all internal, unauthorized items. This work presents a hybrid model that classifies website attacks as benign through the integration of four machine learning algorithms: gradient boost (GB), multilayer perceptron (MLP), logistic regression (LR) and K nearest neighbor (KNN). The work dep.oyed Tree-based Pipeline Optimization Tool (TPOT) that utilizes the Genetic algorithm (GA) to extract the optimal parameter and consequently enhance the model performance. The model underwent evaluation utilizing a data set from the Canadian Institute 2023 that contains various types of attacks. Among these algorithms, GB achieved the best accuracy scores of 95%, 94% and 95% for accuracy, recall and F1-score, respectively.
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte...
详细信息
Ahstract- Timely detection of stroke is paramount for effective intervention and improved patient outcomes. This study introduces an innovative method for early stroke prediction utilizing machine learning (ML) models...
详细信息
ISBN:
(数字)9798350349450
ISBN:
(纸本)9798350349467
Ahstract- Timely detection of stroke is paramount for effective intervention and improved patient outcomes. This study introduces an innovative method for early stroke prediction utilizing machine learning (ML) models optimized through Grid-Search Optimization and elucidated using Shapley Additive Explanations (SHAP). The model not only identifies at-risk individuals but also enables timely preventative interventions. Twelve ML models were thoroughly compared and evaluated with the XGBoost model appearing as the superior performance across all metrics, achieving an accuracy of 94.29%, precision of 92.65%, recall of 96.19%, F1-score of 94.39%, and an impressive AUC ROC value of 99.82%. Furthermore, the SHAP analysis further enhances interpretability, highlighting elevated glucose as a major risk factor, along with age and BMI, aligning with established medical knowledge. This integrated ML methodology, combining performance-driven grid-search optimization and interpretability through SHAP, holds promise for assisting healthcare professionals in targeted stroke prevention strategies by accurately identifying high-risk individuals.
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte...
详细信息
ISBN:
(数字)9798350394962
ISBN:
(纸本)9798350394979
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for content owners and service providers. The Paper describes a secure (tampering-resistant) method for watermarking images for protection and authentication and digital media like audio, video, and multimedia data, and a combination of singular value decomposition (SVD) and Discrete wavelet transform (DWT) for insertion watermark by MATLAB to increase accuracy, simplicity, and flexibility Readability, secure robustness, and imperceptibility the visibility of the image. The proposed algorithm consists of three main steps: Firstly, we decomposed the original image into four sub-bands and the original watermark. Secondly, embed the watermark in the LL sub-band by replacing the singular value for the watermark. Finally, embed a watermark in the other three sub-bands by adding LL values for a watermark in each sub-band in the original image.
the explosion if e.-commerce businesses have seen the growth if number if the online businesses worldwide. Consumers nowadays are opted with inline business commerce which is inconsiderably inconvenience compared to t...
详细信息
暂无评论