Many security cameras have been put up in places like airports, roads, and banks for the safety of these public places. These cameras make a lot of video data, and most security camera recordings are only ever seen wh...
详细信息
In recent times, drastic climate changes have caused a substantial increase in the growth of crop diseases. This causes large-scale demolition of crops, decreases cultivation, and eventually leads to the financial los...
详细信息
As the use of big data and its potential benefits become more widespread, public and private organizations around the world have realized the imperative of incorporating comprehensive and robust technologies into thei...
详细信息
Skin cancer presents in various forms, including squamous cell carcinoma (SCC), basal cell carcinoma (BCC), and melanoma. Established risk factors include ultraviolet (UV) radiation exposure from solar or artificial s...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource *** study proposes a lightweight and efficient authentication scheme for *** proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardwarebased solution with a simple *** proposed scheme works in four stages:system initialization,EU registration,EU authentication,and session *** is implemented as a single hardware chip comprising registers and XOR gates,and it can run the entire process in one clock ***,the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the *** are conducted to evaluate the proposed authentication *** results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 *** hardware execution time is approximately 0.39 ns,which is a significantly less than the prevalent schemes,whose execution times range in ***,the security of the proposed scheme is examined,and it is resistant to brute-force *** 1.158×10^(77) trials are required to overcome the system’s security,which is not feasible using fastest available processors.
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
Aspect extraction plays a crucial role in understanding the fine-grained nuances of text data, allowing businesses and researchers to gain deeper insights into customer opinions, sentiment distributions, and preferenc...
详细信息
Efficient operations in distributed environments can be obtained by load balancing (LB). LB has turned out to be a vital and interesting research area with respect to the cloud owing to the swift augmentation of cloud...
详细信息
E-learning environments represent digital platforms designed to facilitate online learning experiences. Recognizing the diverse learning preferences of individuals, the need for identifying and integrating multi-layer...
详细信息
With the rapid growth of internet usage,a new situation has been created that enables practicing *** has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,a...
详细信息
With the rapid growth of internet usage,a new situation has been created that enables practicing *** has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,anxiety,and *** the anonymity people get on the internet,they tend to bemore aggressive and express their emotions freely without considering the effects,which can be a reason for the increase in cyberbullying and it is the main motive behind the current *** study presents a thorough background of cyberbullying and the techniques used to collect,preprocess,and analyze the ***,a comprehensive review of the literature has been conducted to figure out research gaps and effective techniques and practices in cyberbullying detection in various languages,and it was deduced that there is significant room for improvement in the Arabic *** a result,the current study focuses on the investigation of shortlisted machine learning algorithms in natural language processing(NLP)for the classification of Arabic datasets duly collected from Twitter(also known as X).In this regard,support vector machine(SVM),Naive Bayes(NB),Random Forest(RF),Logistic regression(LR),Bootstrap aggregating(Bagging),Gradient Boosting(GBoost),Light Gradient Boosting Machine(LightGBM),Adaptive Boosting(AdaBoost),and eXtreme Gradient Boosting(XGBoost)were shortlisted and investigated due to their effectiveness in the similar ***,the scheme was evaluated by well-known performance measures like accuracy,precision,Recall,and ***,XGBoost exhibited the best performance with 89.95%accuracy,which is promising compared to the state-of-the-art.
暂无评论