The rapid evolution of deep learning in the current era has prompted extensive exploration in the realm of Brain-computer Interface (BCI). Despite the substantial progress made in enhancing the accuracy of BCI systems...
详细信息
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho...
详细信息
The task of text-to-image generation has encountered significant challenges when applied to literary works, especially poetry. Poems are a distinct form of literature, with meanings that frequently transcend beyond th...
详细信息
The majority of critical injuries caused by road accidents occur in developing nations, where they are a major global concern. Due to these traffic incidents, many individuals have lost loved ones. Consequently, a sys...
详细信息
Graphs find wide applications in numerous domains, ranging from simulating physical systems to learning molecular fingerprints, predicting protein interfaces, diagnosing diseases, etc. These applications encompass sim...
详细信息
Graphs find wide applications in numerous domains, ranging from simulating physical systems to learning molecular fingerprints, predicting protein interfaces, diagnosing diseases, etc. These applications encompass simulations in non-Euclidean space, in which a graph serves as an ideal representation, and are also an indispensable means of illustrating the connections and interdependencies among its various constituents. Graph neural networks (GNNs) are specific types of neural networks that are specifically built to handle data possessing a graph structure. They are highly effective at capturing intricate relationships among different entities. Nonetheless, their "black-box" characteristics pose difficulties in transparency, trust, and interpretability, especially in critical sectors like heath care, banking, and autonomous systems. Explainable artificial intelligence (XAI) has emerged to clarify these obscure decision-making processes, thus enhancing trust and accountability in AI systems. This survey paper delves into the intricate interplay between GNNs and XAI, including an exhaustive taxonomy of the various explainability methods designed for graph-structured data. It classifies the existing explainability methods into post hoc and self-interpretable models. The paper analyzes their practical applications in diversified fields, highlighting the significance of transparent GNNs in essential sectors such as fraud detection, drug development, and network security. The survey also delineates evaluation parameters for assessing explainability along with addressing persistent issues in scalability and fairness. The paper concludes by addressing prospective advancements in the subject, including the creation of innovative XAI methodologies tailored for GNN architectures, integration with federated learning, and utilization of these models in interdisciplinary fields. This study bridges the gap between GNNs and XAI, providing an essential resource for researchers and p
As cloud computing adoption in colleges continues to rise, the security of private cloud systems has become a paramount concern. Data breaches resulting from cyber attacks can inflict severe damage to a university'...
详细信息
ISBN:
(纸本)9798350300857
As cloud computing adoption in colleges continues to rise, the security of private cloud systems has become a paramount concern. Data breaches resulting from cyber attacks can inflict severe damage to a university's revenue and reputation. This research proposes a novel machine learning-based cyber threat detection system tailored to the university's private cloud environment. The system's main objective is to continuously monitor the cloud infrastructure and employ advanced machine learning algorithms to analyze network traffic, identify and prevent unusual activities that may indicate potential cyber-attacks. Here, the challenges posed on two sides of known possible threats and attack worldwide come across, and administrative defaults leads to security hole. By leveraging the power of machine learning, this innovative system aims to enhance the university's cyber defence capabilities. It considers the dynamic and evolving nature of cyber threats, enabling real-time detection and proactive measures against malicious activities. The integration of cutting-edge machine learning models and feature extraction techniques empowers the system to identify patterns of anomalous behaviour, even in the face of sophisticated attacks. Key components of the proposed system include network traffic analysis, anomaly detection and threat intelligence integration. Through the analysis of network packets and access logs, the system can effectively detect signs of unauthorized access, data exhilaration, and other cyber threats. Additionally, threat intelligence feeds provide the system with up-to-date information on emerging threats, enabling quick responses to potential risks. Moreover, the system's implementation adheres to privacy and data protection regulations, ensuring secure handling of sensitive information within the private cloud environment. Regular updates and adaptive learning capabilities enable the system to evolve with changing cyber threats, ensuring continued robustn
The brain's own aberrant and unregulated cell division is what causes brain tumors. In the tumor growth exceeds 50%, the patient will not be able to recover. As a result, rapid and precise brain tumor identificati...
详细信息
Modern security and law enforcement involve face detection and recognition technologies, which are crucial instruments in criminal identification. It is a comprehensive system integrating advanced face detection algor...
详细信息
The world population continues to increase with a large proportion of this increase happening in Africa just as predicated by Food and Agriculture Organization of the United Nation. To meet the demand of feeding this ...
详细信息
Pre-clusters assessment is a significant problem in data clustering. It found that visual cluster tendency assessment (VAT) is majorly focused on addressing the problem of pre-clusters assessment. This visual techniqu...
详细信息
暂无评论