Storing digital images in the cloud, managed by third-party services, offers numerous advantages over traditional on-premises storage. It empowers scalability, accessibility from anywhere with internet, reliability th...
详细信息
Pneumonia is a significant global health concern, especially for vulnerable populations such as children under five. Timely and accurate diagnosis is critical for effective treatment and improved patient outcomes. Thi...
详细信息
This paper aims to deal with the difficulties faced by blind while interacting with their surroundings. The proposed system introduces VEye - An AI Vision Assistant, a wearable device with an integrated camera and an ...
详细信息
In today's scenario, securing prompt and accurate legal aid remains tough for many due to India's complex legal system, a scarcity of lawyers, high fees, and widespread legal unawareness. To address these issu...
详细信息
Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify c...
详细信息
ISBN:
(纸本)9798350348422
Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify cyber attacks at the host-and network-levels. A scalable solution is needed since destructive attacks are happening so quickly and are changing all the time. For more investigation, the malware community has access to a number of malware databases. The performance of several machine learning algorithms on a range of datasets that were made available to the general public, however, has not yet been thoroughly evaluated by any study. The publicly available malware datasets should be regularly updated and benchmarked due to the dynamic nature of malware and the continuously evolving attacking techniques. In this study, a deep neural network (DNN), a type of deep learning model, is examined in order to create a flexible and efficient IDS to identify and categorise unexpected and unanticipated cyber threats. In order to analyse a variety of datasets that have been produced throughout time using both static and dynamic methodologies, it is vital to take into account the rapid increase in attacks and the constant evolution of network behaviour. It is simpler to select the most effective algorithm for accurately predicting forthcoming cyber attacks with the help of this type of research. Many publicly available benchmark malware datasets are used to offer a thorough review of DNN and other conventional machine learning classifier studies. The KDDCup 99 dataset and the accompanying hyper parameter selection techniques are used to choose the ideal network parameters and topologies for DNNs. A learning rate of [0.01-0.5] is applied to every 1,000-epoch DNN experiment. A variety of datasets, including NSL-KDD, UNSW-NB15, Kyoto, WSN-DS, and CICIDS 2017, as well as the DNN model that performed well on KDDCup 99 are used to conduct the benchmark. Our DNN model trains a
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherin...
详细信息
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of *** urges a reliable,flexible,transparent,secure,and cost-effective voting *** proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting *** smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain ***,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or ***,the overall performance of the proposed system is significantly better than that of the existing *** performance was analyzed based on authentication delay,vote alteration,response time,and latency.
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has beco...
详细信息
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has become highly *** a result,various privacy-preserving data analysis technologies have ***,we use the randomization process to reconstruct composite data attributes ***,we use privacy measures to estimate how much deception is required to guarantee *** are several viable privacy protections;however,determining which one is the best is still a work in *** paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data ***-more,this paper investigates the use of arbitrary nature with perturbations in privacy *** to the research,arbitrary objects(most notably random matrices)have"predicted"frequency *** shows how to recover crucial information from a sample damaged by a random number using an arbi-trary lattice spectral selection *** system's conceptual frame-work posits,and extensive practicalfindings indicate that sparse data distortions preserve relatively modest privacy protection in various *** a result,the research framework is efficient and effective in maintaining data privacy and security.
Quantum Computing (QC) works based on the principle of quantum mechanics, which is different from traditional computers. Heart disease remains the leading cause of mortality worldwide and the development of advanced p...
详细信息
Bangladesh has recently adopted the worldwide trend of digitalization, namely in the area of financial activities. In Bangladesh, the centralized nature of digital payment systems poses notable obstacles, such as leng...
详细信息
Understanding consumer attitudes toward specific products is crucial for boosting sales in the e-commerce industry. To effectively target customers with popular products based on reviews, the classification of consume...
详细信息
暂无评论