In modern cloud environments, Docker containers have become a cornerstone for efficient application deployment, enabling microservices architectures and seamless scalability. However, large-scale Docker environments p...
详细信息
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over t...
详细信息
ISBN:
(纸本)9798350352931
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over the last decade, the number of these computing systems - including desktops, laptops, smartphones, and the Internet of Things (IoT) - has skyrocketed. Among them, cell phones are practically integral to modern life. The popularity of web-based assaults has skyrocketed with the exponential growth in the number of individuals using the Internet. These web-based assaults are increasingly being combatted by security corporations. Unfortunately, new forms of these assaults are appearing all the time, making it hard for older security measures to stay up. Artificial intelligence (AI) is a source of optimism in the current cybersecurity landscape, offering a potential solution to the ever-changing digital dangers. The fast development of AI over the last decade has given rise to this optimism, because it is now impacting the expansion of every industry. With AI bringing so many advantages in every field, online security is one sector that just cannot afford to ignore it. This planned effort's work represents an advance in that direction. Critical online security issues have been the focus of this proposed work's study, which aims to address these issues using AI. Web security issues for desktop and mobile devices have been addressed in the proposed work. The planned work's contributions to online security are as follows: The 'MalCrawler' web crawler is a targeted tool for finding and exploring the web. This crawler makes it easy to gather websites, particularly ones that are harmful. It does a better job of collecting dangerous websites than a typical crawler. Additionally, it is built to circumvent the evasion strategies used by rogue websites. The crawler's ability to gather webpages - particularly dangerous ones - in order to provide datasets for ML-based an
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be em...
详细信息
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of *** quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression *** article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage *** proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data ***,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded *** addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably *** order to generate optimal codebook for LBG,the WSA is applied to *** performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several *** comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods.
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,D...
详细信息
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of *** IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT *** this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS *** CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)*** proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in *** inv
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various frequency bands.A recent wireless communication network uses OFDM in longterm evolution(LTE)and 5G,among *** main problem faced by 5G wireless OFDM is distortion of transmission signals in the *** transmission loss is called peak-to-average power ratio(PAPR).This wireless signal distortion can be reduced using various *** study uses machine learning-based algorithm to solve the problem of PAPR in 5G wireless *** transmit sequence(PTS)helps in the fast transfer of data in wireless *** is merged with deep belief neural network(DBNet)for the efficient processing of signals in wireless 5G *** indicates that the proposed system outperforms other existing ***,PAPR reduction in OFDM by DBNet is optimized with the help of an evolutionary algorithm called particle swarm ***,the specified design supports in improving the proposed PAPR reduction architecture.
The incorporation of neural networks into medical imaging has recently resulted in significant modifications to diagnosis. This article looks at the job of brain networks in clinical picture handling, featuring their ...
详细信息
Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to *** is diagnosed through many blood tests and factors;Artificial Intelligence(AI)t...
详细信息
Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to *** is diagnosed through many blood tests and factors;Artificial Intelligence(AI)techniques have played an important role in early diagnosis and help physicians make *** study evaluated the performance of Machine Learning(ML)algorithms on the hepatitis data *** dataset contains missing values that have been processed and outliers *** dataset was counterbalanced by the Synthetic Minority Over-sampling Technique(SMOTE).The features of the data set were processed in two ways:first,the application of the Recursive Feature Elimination(RFE)algorithm to arrange the percentage of contribution of each feature to the diagnosis of hepatitis,then selection of important features using the t-distributed Stochastic Neighbor Embedding(t-SNE)and Principal Component Analysis(PCA)***,the SelectKBest function was applied to give scores for each attribute,followed by the t-SNE and PCA ***,the classification algorithms K-Nearest Neighbors(KNN),Support Vector Machine(SVM),Artificial Neural Network(ANN),Decision Tree(DT),and Random Forest(RF)were fed by the dataset after processing the features in different methods are RFE with t-SNE and PCA and SelectKBest with t-SNE and PCA).All algorithms yielded promising results for diagnosing hepatitis data *** RF with RFE and PCA methods achieved accuracy,Precision,Recall,and AUC of 97.18%,96.72%,97.29%,and 94.2%,respectively,during the training *** the testing phase,it reached accuracy,Precision,Recall,and AUC by 96.31%,95.23%,97.11%,and 92.67%,respectively.
Decision tree classifiers are widely used in machine learning and data mining due to their intuitiveness. However, they do not perform well for class-imbalanced data due to bias creation towards the majority class. Th...
详细信息
Decreased tendon stiffness is considered to be a factor in the progression of tendon injury, and research is ongoing to develop methods for quantitatively assessing tendon stiffness. Strain ratio (SR) measurement usin...
详细信息
Delay-sensitive applications are becoming more and more in demand as a result of the development of information systems and the expansion of communication in cloud computing technologies. Some of these requests will b...
详细信息
暂无评论