This research introduces a novel mobile application that employs augmented reality (AR) to enhance user engagement with weather information. By integrating Unreal Engine for advanced 3D visualization and React Native ...
详细信息
Phishing attacks, a prevalent form of social engineering and cyber threats, exploit human vulnerabilities to deceive internet users into divulging sensitive data for deceptive intentions. Among these, URL-based phishi...
详细信息
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C...
详细信息
With the busy lifestyle and lack of time, people are looking for a way for the proactive management of their well-being. A health monitoring app helps users obtain insights about their health and take necessary steps ...
详细信息
The Internet of Things (IoT) becomes the most demanding technology over the past few years. IoT is the basic need of daily life. The security of these devices is very important because they contain large files of sens...
详细信息
The Internet of Things (IoT) extends the reach of the Internet by allowing intelligent devices to discover and connect with the actual surroundings, as well as interact with other physical entities. Software Defined N...
详细信息
Background: Cloud services have become a popular approach for offering efficient services for a wide range of activities. Predicting hardware failures in a cloud data center can minimize downtime and make the system m...
详细信息
Psychometric evaluation evaluates the information, abilities, capacity and persona trends of someone being assessed. Since many youngsters are joined in faculty earlier than they meet the specified age criteria, they ...
详细信息
Internet-of-things is one of the prominent communication technologies in the 21st century. We can connect everyday objects, like baby monitors, thermostats, e-health, etc., Connecting IoT with Software-defined network...
详细信息
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,*** Cloud Computing provides various advantages for u...
详细信息
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,*** Cloud Computing provides various advantages for users,it remains vulnerable to many types of attacks that attract cyber *** Denial of Service(DDoS)is the most common type of attack on cloud ***,Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS *** DDoS attacks have become increasingly widespread,it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish various types of DDoS ***,the monitoring pattern of traffic changes and accurate detection of DDoS attacks are most important and *** this research work,DDoS attack detection methods based on deep belief network feature extraction and Hybrid Long Short-Term Memory(LSTM)model have been proposed with NSL-KDD *** Hybrid LSTM method,the Particle Swarm Optimization(PSO)technique,which is combined to optimize the weights of the LSTM neural network,reduces the prediction *** deep belief network method is used to extract the features of IP packets,and it identifies DDoS attacks based on PSO-LSTM ***,it accurately predicts normal network traffic and detects anomalies resulting from DDoS *** proposed PSO-LSTM architecture outperforms the classification techniques including standard Support Vector Machine(SVM)and LSTM in terms of attack detection performance along with the results of the measurement of accuracy,recall,f-measure,precision.
暂无评论