A serious medical problem that impacts millions of people globally is chronic kidney disease, or CKIDD. Accurate CKIDD progression prediction is essential for disease management and early intervention. Machine learnin...
详细信息
Detection of objects moving in a video is regarded as a vital problem in image processing applications i.e. the detection during the movement of camera is considered significant in video processing. In this paper, the...
详细信息
Anomaly detection in clinical pix is vital to identify and diagnose diseases. Deep reinforcement gaining knowledge is a practical gadget-mastering approach implemented for more than a few medical obligations. This tec...
详细信息
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due ...
详细信息
ISBN:
(纸本)9798350300093
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due to the presence of vulnerabilities and threats throughout the system that has the potential to be taken advantage of at any time, considering that any component of the system is susceptible to such attacks. As a result, supply chain security is difficult to achieve. This has the potential to create a significant interruption to the overall continuity of the company. Therefore, it is of the utmost importance to identify the hazards and make educated guesses about their likely outcomes so that organizations can take the appropriate precautions to ensure the safety of their supply chains. By leveraging a range of factors, such as the expertise and incentives of threat actors, Tactics, Techniques, and Procedures (TT and P), as well as Indicators of Compromise (IoC), the analysis of Cyber Threat Intelligence (CTI) offers valuable information on both identified ansignd unidentified cybersecurity threats. In order to increase the safety of the cyber supply chain, the purpose of this article is to investigate and speculate on potential dangers. The CTI and Machine Learning (ML) approaches have been employed by us in order to study and forecast the risks based on the CTI attributes. This makes it possible to detect the inherent CSC vulnerabilities, which enables suitable control. To enhance the overall security of computer systems, it is imperative to implement specific actions, including the collection of CTI data and the adoption of various machine learning techniques. These techniques encompass Logistic Regression (LG), Support Vector Machine (SVM), Random Forest (RF), Decision Tree (DT), Cat Boost, and Gradient Boost, which are employed in analyzing the Microsoft Malware Prediction dataset to create predictive analytics. This is done in order to illustrate t
The aim of this research paper is to investigate how machine learning can be incorporated to improve security around multi-clouds, with specific reference to the challenges. Based on the datasets obtained from Kaggle,...
详细信息
The present work develops a method for identity authentication and verification of static signatures stored in the database employing artificial neural network. The present method uses mathematical moments for feature...
详细信息
Segregation of images is a critical step in processing images, computer vision, and a variety of other disciplines. The technique involves decomposing an illustration into numerous components or components, every sing...
详细信息
Data is valuable asset for organizations but it cannot be used directly for business decision making. It needs to be processed in a form that is easily understandable and can to be used by decision makers. The databas...
详细信息
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. The aim o...
详细信息
A novel and efficient 2-level secure reversible data hiding (RDH) method has been proposed based on image interpolation and Arnold transformation. An input image is scaled-down to original image and then scaled up...
详细信息
暂无评论