The quality of development documents written in natural language is basically ensured by developer’s review with quite a few man-hours. Natural language processing (NLP) tools can partially automate the time-consumin...
详细信息
To fortify security mechanisms in software systems for the Internet of Things (IoT), this article presents a framework for AI-Enhanced Virtual Twin Modelling. In order to track and examine the actions of IoT devices i...
详细信息
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called *** deep learning approaches and the machine learning are c...
详细信息
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called *** deep learning approaches and the machine learning are compared in the proposed system for presenting the methodology that can detect phishing websites via Uniform Resource Locator(URLs)*** legal class is composed of the home pages with no inclusion of login forms in most of the present modern solutions,which deals with the detection of ***,the URLs in both classes from the login page due,considering the representation of a real case scenario and the demonstration for obtaining the rate of false-positive with the existing approaches during the legal login pages provides the test having *** addition,some model reduces the accuracy rather than training the base model and testing the latest *** addition,a feature analysis is performed on the present phishing domains to identify various approaches to using the phishers in the campaign.A new dataset called the MUPD dataset is used for ***,a prediction model,the Dense forward-backwards Long Short Term Memory(LSTM)model(d−FBLSTM),is presented for combining the forward and backward propagation of LSMT to obtain the accuracy of 98.5%on the initiated login URL dataset.
作者:
Gote, Pradnyawant M.Kumar, PraveenDhale, TrishulMishra, Gaurav Vedprakash
Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India
Jawaharlal Nehru Medical College Department of Radiodiagnosis Maharashtra Wardha442001 India
Disease diagnosis using non-invasive techniques is a key determinant in the improvement of outcomes in patients and the enhancement of precautionary health measures. The study focuses on the design and development of ...
详细信息
The proposed research work suggests a combined technique based on decision trees and cloud computing for predicting cognitive decline in Alzheimer's patients. Medical records and data from wearable devices are amo...
详细信息
Microarray gene expression (MGE) data classification is a vital challenge in biomedical and genomics research, designed to understand the difficult relations among genes and numerous biological states. In this procedu...
详细信息
Mosquitoes carries a parasitic infection that affects millions of peoples globally. The initial and meticulous prediction of outbursts, patient verdict, and treatment enhancement can all considerably diminish the cons...
详细信息
There has been a considerable increase in the use of drones,or unmanned aerial vehicles(UAVs),in recent times,for a wide variety of purposes such as security,surveillance,delivery,search and rescue operations,penetrat...
详细信息
There has been a considerable increase in the use of drones,or unmanned aerial vehicles(UAVs),in recent times,for a wide variety of purposes such as security,surveillance,delivery,search and rescue operations,penetration of inaccessible or unsafe areas,*** increasing number of drones working in an area poses a challenge to finding a suitable charging or resting station for each drone after completing its task or when it goes low on its *** classical methodology followed by drones is to return to their pre-assigned charging station every time it requires a *** approach is found to be inefficient as it leads to an unnecessary waste of time as well as power,which could be easily saved if the drone is allotted a nearby charging station that is ***,we propose a drone-allocation model based on a preference matching algorithm where the drones will be allotted the nearest available station to land if the station is *** problem is modeled as three entities:Drones,system controllers and charging *** matching algorithm was then used to design a Drone-Station Matching *** simulation results of our proposed model showed that there would be considerably less power consumption and more time saving over the conventional *** would save its travel time and power and ensure more efficient use of the drone.
The demand for more efficient and reliable elevator monitoring systems has increased due to security and safety issues in high-mobility buildings. This paper proposes a microservice architecture for an elevator monito...
详细信息
In this paper, we give the focus on the continuous advancement in the domain of Vehicular ad hoc networks (VANET’s) and that is developed as a tool for developing the base for platform intelligent mode in the communi...
详细信息
暂无评论