Two-stage object detection algorithms have gained significant attention in computer vision due to their robustness and accuracy in detecting objects in images. These algorithms consist of two main stages: region propo...
详细信息
Objective: With the establishment of virtualized datacenters on a large scale, cuttingedge technology requires more energy to deliver the services 24*7 hours. With this expansion and accumulation of information on a m...
详细信息
The IoT (Internet of Things) link system, various applications, data storage like cloud, and another service area that possibly will be a fresh entry for attackers as they uninterruptedly offer services in the organiz...
详细信息
Modular irregular labeling is an edge irregular labeling of a graph in which the edges and vertices are labelled with 1, 2, 3,.. k such that the weight of all vertices are different. The complete bipartite graph is wh...
详细信息
Many natural language processing (NLP) tasks, including machine translation, document classification, information retrieval, news category classification, document clustering, news category clustering, and question-an...
详细信息
ISBN:
(纸本)9798350398496
Many natural language processing (NLP) tasks, including machine translation, document classification, information retrieval, news category classification, document clustering, news category clustering, and question-answering systems require the use of distributional word vector representation which is a very low dimensional vector representation of words that is called word embedding, such as contextual and non-contextual embedding. In addition to several contextual word-embedding approaches like BERT, IndicBERT, and SahojBERT (the Bengali equivalent of BERT), this work also covers numerous embedding strategies (such as Word2Vec, GloVe, and FastText) with multiple hyper-parameters. Of late, word embeddings from general corpus such as Wikipedia dump, and common crawl corpus are very famous to make word vectors. In the case of Indian languages also such type of corpus is used to make word vectors. But it suffers in giving good accuracy in general NLP tasks like Sentiment Analysis, News Category Classification, and News Category Clustering, especially for the Bengali Language. This research demonstrates, most importantly, that word embedding from a domain-related corpus enhances the quality of the embedding as those embeddings are working far better than general pre-trained word embeddings which can be used in various NLP tasks like News Category Classification, Word Similarity, and Document Clustering like News Category Clustering using various clustering techniques like KMeans, KMedoid algorithms and also obtaining better accuracy. This work proves that making word vectors or word embedding from a domain-related corpus for a particular NLP task derives better results alongside the quality of those embeddings. Throughout this work, a Deep Neural Network model was used. And the same model was used in all the tests and findings in this work. This work clearly states if word embedding can be derived from a corpus that is related to the domain on which NLP tasks will be p
With the rapid advancement of digital technologies, the electronic health record is not a concept but a reality. Electronic health records (EHR) are the patients’ health information that are stored for further refere...
详细信息
In a wireless environment, a Man-in-the-Middle (MITM) attack takes place whilst a threat actor intercepts communication between two devices, generally a user's device and a Wi-Fi access point. At a point, an attac...
详细信息
ISBN:
(数字)9798331537579
ISBN:
(纸本)9798331537586
In a wireless environment, a Man-in-the-Middle (MITM) attack takes place whilst a threat actor intercepts communication between two devices, generally a user's device and a Wi-Fi access point. At a point, an attacker can eavesdrop, inj ect malware, or steal delicate information. This study focuses on address resolution protocol (ARP) poisoning. An ARP is a type of cyberattack in which a threat actor impersonates someone else and use local area network (LAN) to transmit fictitious ARP (Address Resolution Protocol) packets in an attempt to create a parallel connection to their own MAC (Media Access Control) address with the IP address of a legitimate device in the access point. These lead to intercepting data intended for a legitimate device, stealing sensitive information, or launching further attacks. So, with the help of Kali Linux using a virtual box the Arp poisoning attack is initially tested using Ettercap for ARP poisoning, followed by the implementation of the MR ARP technique to detect and prevent anomalies. The tools utilized include Wireshark for network analysis, Ettercap for testing ARP poisoning, and a Python script for detection and prevention. Further enhancements may include the addition of a graphical user interface (GUI), Automated Blocking Mechanism, integration with intrusion detection systems (IDS), or extended support for IPv6.
The safe transfer and preservation of medical images is crucial in the age of digital healthcare. Watermarking medical images is an essential method of adding patient data, hospital logos, and other pertinent informat...
详细信息
In recent times, generative AI has advanced quickly, and Generative Adversarial Network (GAN) has been used to create realistic-looking fake multimedia. It is still quite difficult to identify these Artificial Intelli...
详细信息
Coronavirus Disease 2019 (COVID-19) has impacted our world. Risk classification during hospitalization is essential for medical planning and allocation of resources, and hence for lowering death rates, especially in u...
详细信息
暂无评论