As an emerging technology, Software Defined Networks (SDN) has led to several vulnerabilities and risks, making it adoption challenging. Cyber threats in SDN include a wide range of malicious activities intended to ex...
详细信息
One of the drastically growing and emerging research areas used in most information technology industries is Bigdata *** is created from social websites like Facebook,WhatsApp,Twitter,*** about products,persons,initia...
详细信息
One of the drastically growing and emerging research areas used in most information technology industries is Bigdata *** is created from social websites like Facebook,WhatsApp,Twitter,*** about products,persons,initiatives,political issues,research achievements,and entertainment are discussed on social *** unique data analytics method cannot be applied to various social websites since the data formats are *** approaches,techniques,and tools have been used for big data analytics,opinion mining,or sentiment analysis,but the accuracy is yet to be *** proposed work is motivated to do sentiment analysis on Twitter data for cloth products using Simulated Annealing incorporated with the Multiclass Support Vector Machine(SA-MSVM)***-MSVM is a hybrid heuristic approach for selecting and classifying text-based sentimental words following the Natural Language Processing(NLP)process applied on tweets extracted from the Twitter dataset.A simulated annealing algorithm searches for relevant features and selects and identifies sentimental terms that customers ***-MSVM is implemented,experimented with MATLAB,and the results are *** results concluded that SA-MSVM has more potential in sentiment analysis and classification than the existing Support Vector Machine(SVM)***-MSVM has obtained 96.34%accuracy in classifying the product review compared with the existing systems.
Mehta and Panigrahi (FOCS 2012, IEEE, Piscataway, NJ, 2012, pp. 728-737) introduce the problem of online matching with stochastic rewards, where edges are associated with success probabilities and a match succeeds wit...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world *** existing analysis of software security vulnerabilities often focuses on specific features or *** partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the *** key novelty lies in overcoming the constraints of partial *** proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security *** guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each *** guidelines are not only practical but also applicable in real-world software,allowing for prioritized security *** proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related *** analysis resulted in the identification of a total of 121 *** successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
Robotics is an amalgamation of mechanical engineering and computerscience. Mechanical engineering helps to design and develop mechanical parts and devices for control systems in robots. Space robots and robotics are ...
详细信息
The advancements in sensors, processing, storage and networking technologies have turned smartphone into de facto lifelogging device. Realizing the lifelogging potential of smartphone, researchers have postulated with...
详细信息
Malware represents the greatest threat to cybersecurity and serves as the weapon of choice for carrying out nefarious activities in the digital realm. The proliferation of malware poses significant risks to individual...
详细信息
Herein, we propose high-performance Ti/STO/n+-Si and Ag/STO/n+-Si write-once-read-many-times devices, where the resistance transition mechanisms are controlled by oxygen vacancies in the STO layer and metal atoms from...
详细信息
Parallel Disassembly Sequence Planning (DSP) deals with obtaining the order of disassembling the product with multiple parts disassembling simultaneously. Existing studies derive the product’s disassembly order based...
详细信息
In the majority of Western nations including America, Australia and Europe, skin cancer is badly-behaved. Skin concealing, inadequacy of Sun-lights, climate, age, and inherited are major risk factors. Early identifica...
详细信息
暂无评论