Anomalous network packet detection is a dire security concern today. ChatGPT era has emerged as a grave concern for computer scientists and programmers. The method of recognizing diverged network activity from the typ...
详细信息
Class Real-life applications generate skewed data that leads to degraded performance of machine learning models. These methods are biased towards the majority class and cause overfitting problems. Oversampling techniq...
详细信息
Recent years have witnessed notable progressions in facial recognition technology which have been led by the inception of deep learning models-primarily Siamese Neural Networks. This article delves into the use of Sia...
详细信息
Due to their open,expansive,and resource-constrained character,Wireless Sensor Networks(WSNs)face significant energy,efficiency,and security *** a fair level of energy and resource consumption,several lightweight cryp...
详细信息
Due to their open,expansive,and resource-constrained character,Wireless Sensor Networks(WSNs)face significant energy,efficiency,and security *** a fair level of energy and resource consumption,several lightweight cryptographic techniques are introduced to increase the security as well as effectiveness of ***,they have problems with scalability,key distribution,security,and power *** work proposes a novel light weighted key distribution mechanism for safe and energy efficient communication in *** proposed model includes stages like optimal Cluster Head Selection(CHS),improved Elliptic Curve Cryptography(ECC)-based encryption,and lightweight key management,*** the first phase,a hybrid optimization strategy is proposed,termed as Coot updated Butterfly algorithm with Logistic Solution Space algorithm(CUBA-LSS)for optimal clustering via selecting the optimal *** selection process relies on the consideration of the Received Signal Strength Indicator(RSSI),energy,delay,and *** transmission is the subsequent process,where the proposed algorithm ensures secured transmission through Improved *** last,a lightweight key management system is determined via session key generation to protect the encryption key.
In addition to ensuring image authenticity, watermarking aids in the recovery of digital images that have been altered or tampered with during transmission. Although many techniques have been developed for embedding t...
详细信息
The Medical Imagechain integrates blockchain technology and Convolutional Neural Networks (CNN) to create secure, decentralized system for managing medical images. Focusing on Slices of Interest (SoI) from MRI brain t...
详细信息
Understanding the learner’s requirements and status is important for recommending relevant and appropriate learning materials to the learner in personalized learning. For this purpose, the learning recommendatio...
详细信息
To improve the effectiveness of online learning, the learning materials recommendation is required to be personalised to the learner material recommendations must be personalized to learners. The existing approaches a...
详细信息
Keratitis is an intraocular disease that is an inflammation of the cornea and one of the challenges of ophthalmology due to its multifarious character and mild initial symptoms. In this paper, we present KeraNet Deep ...
详细信息
Recommendation systems are crucial due to their high relevance in terms of interpretability and performance. A Social Recommendation system explores how social relations influence user choices and how users select ite...
详细信息
暂无评论