Traffic signals and other signs like parking., stop signs., etc. have become very crucial in autonomous and s elf-driving cars as it helps the smart system to comply with the basic traffic rules along with that it hel...
详细信息
In recent years, the increasing interest in ontologies resulted in the developing and publishing of many ontologies in the same or different domains. When users try to reuse the existing ontologies in their applicatio...
详细信息
The stock market plays a pivotal role in a nation's economy. People tend to invest in the stock market due to its high rate of return. However, predicting the stock market remains a formidable challenge. This rese...
详细信息
Hornbills, an iconic species of Malaysia's biodiversity, face threats from habitat loss, poaching, and environmental changes, necessitating accurate and real-time population monitoring that is traditionally challe...
详细信息
Over the years, Cloud computing is becoming increasingly popular due to the continually changing technology. The primary goal of the cloud computing network is to offer consumers pay-per-use usage of on-demand process...
详细信息
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud ***,when the model is not completely trusted,the data owners face several security-rel...
详细信息
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud ***,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data *** addressing and handling the security-related issues on Cloud,several models were *** that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud *** preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data ***,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the ***,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
The rapid growth of the digital industry has created a higher demand for robust Network Intrusion Detection Systems (NIDS) to protect valuable information and the integrity of network infrastructures as the digital in...
详细信息
ISBN:
(纸本)9798331518097
The rapid growth of the digital industry has created a higher demand for robust Network Intrusion Detection Systems (NIDS) to protect valuable information and the integrity of network infrastructures as the digital industry grows rapidly. One of the most important challenges in the current intrusion detection landscape is the growing sophistication of cyber threats, including zero-day attacks, polymorphic malware, and advanced persistent threats, which are difficult to detect using traditional methods. Furthermore, systems often suffer from high false positive rates and struggle to scale effectively in real-time applications. Traditionally, intrusion detection methods were quite effective, but performance is still lacking due to the inability to adapt to evolving threats. Recent breakthroughs include deep learning approaches, ensemble methods, and hybrid detection models. However, these are still plagued by high computational overhead and a lack of transparency in their decision-making processes. The work exploits Optuna for the optimization of hyperparameters, specifically in the performance improvement of various ML models. Among the best-ranked frameworks for the optimization of hyperparameters, Optuna provides a principled method for tuning hyperparameters, resulting in significantly enhanced accuracy and efficiency of the intrusion detection model. The implication of this research work is that it searches for the best configuration of parameters for each algorithm with balanced false positives and detection rates. The study includes an overall scenario of recent development in NIDS. More precisely, this paper shows how Hyperparameter tuning attains very superior model performance compared to other models. The comparative results presented have shown that models which are optimized using Optuna surpass the non-optimized ones by a huge margin with respect to accuracy, recall, precision, and F1-score. The paper also discusses ensemble techniques by integrating the
A retail company used Power BI to analyse sales data for three months. The team developed 1 00 %. stacked bar charts, donut charts, ribbon charts, line charts, and tree maps from the 'Supermarket Sales' datase...
详细信息
Current revelations in medical imaging have seen a slew of computer-aided diagnostic(CAD)tools for radiologists *** tumor classification is essential for radiologists to fully support and better interpret magnetic res...
详细信息
Current revelations in medical imaging have seen a slew of computer-aided diagnostic(CAD)tools for radiologists *** tumor classification is essential for radiologists to fully support and better interpret magnetic resonance imaging(MRI).In this work,we reported on new observations based on binary brain tumor categorization using HYBRID ***,the collected image is pre-processed and augmented using the following steps such as rotation,cropping,zooming,CLAHE(Contrast Limited Adaptive Histogram Equalization),and Random Rotation with panoramic stitching(RRPS).Then,a method called particle swarm optimization(PSO)is used to segment tumor regions in an MR *** that,a hybrid CNN-LSTM classifier is applied to classify an image as a tumor or *** this proposed hybrid model,the CNN classifier is used for generating the feature map and the LSTM classifier is used for the classification *** effectiveness of the proposed approach is analyzed based on the different metrics and outcomes compared to different methods.
Electronic health records (EHRs) play a vital role in simplifying thorough and effective patient treatment, promoting smooth exchange of information between medical professionals, and enhancing the process of making c...
详细信息
暂无评论