With the development and application of internet and information communication technology, countries around the world have invested heavily in the space industry in recent years, with particular emphasis on the deploy...
详细信息
Exterior painting of high-rise buildings is a challenging task. In our country, as well as in other countries of the world, this task is accomplished manually, which is risky and life-threatening for the workers. Rese...
详细信息
To address the privacy concerns for state-of-the-art cutting-edge centralized machine learning in electric vehicle (EV) charging demand forecasting applications, federated learning (FL) has been employed to transfer t...
详细信息
Everyday, there are a growing number of people who require blood transfusions and there is no substitute for human blood. The secure blood donors are voluntary non-remunerated blood donors from risk populations. Donor...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
This paper presents an innovative approach to enhance the querying capability of ChatGPT,a conversational artificial intelligence model,by incorporating voice-based interaction and a convolutional neural network(CNN)-...
详细信息
This paper presents an innovative approach to enhance the querying capability of ChatGPT,a conversational artificial intelligence model,by incorporating voice-based interaction and a convolutional neural network(CNN)-based impaired vision detection *** proposed system aims to improve user experience and accessibility by allowing users to interact with ChatGPT using voice ***,a CNN-based model is employed to detect impairments in user vision,enabling the system to adapt its responses and provide appropriate *** research tackles head-on the challenges of user experience and inclusivity in artificial intelligence(AI).It underscores our commitment to overcoming these obstacles,making ChatGPT more accessible and valuable for a broader *** integration of voice-based interaction and impaired vision detection represents a novel approach to conversational ***,this innovation transcends novelty;it carries the potential to profoundly impact the lives of users,particularly those with visual *** modular approach to system design ensures adaptability and scalability,critical for the practical implementation of these ***,the solution places the user at its *** responses for those with visual impairments demonstrates AI’s potential to not only understand but also accommodate individual needs and preferences.
The growing call for online technology software has additionally elevated the call for great and occasional-cost merchandise. Predicting software vulnerabilities is one of the most essential obligations of a very good...
详细信息
ISBN:
(纸本)9798350369861
The growing call for online technology software has additionally elevated the call for great and occasional-cost merchandise. Predicting software vulnerabilities is one of the most essential obligations of a very good security gadget. Growth nice at low cost by decreasing ordinary testing and preservation efforts. Early detection of defects in the software program improvement existence Cycle (SDLC) leads to early improvement and transport in the closing period of software program control, which leads to consumer delight and gives self assurance to the development group. in the beyond decade, many machine learning-primarily based blunders prediction software program were proposed to attain excessive accuracy. synthetic Neural Networks (ANN) are considered one of the system gaining knowledge of techniques and encompass maximum of the prediction schemes and models. ∗ This examine provides a vital analysis of the modern facts published due to the fact that 20152018. On the usage of neural networks for software program prediction. This take a look at is based totally on the studies system information from 3 widely used digital libraries (which include IEEE, Elsevier and Springer) and then conducted the subsequent take a look at. 8 most crucial articles were selected in the course of the entire method. studies courses are examined meticulously. ∗ This paintings will help researchers look into the modern-day country of software disorder prediction through focusing on neural networks and provide benchmarks for destiny trends. This white paper uses device getting to know and deep learning to find out the quality device gaining knowledge of algorithms for software defect prediction (SEP). This have a look at uses the NASA Metric statistics program (MDP) dataset to evaluate and predict the overall performance and accuracy of deep getting to know and machine getting to know fashions. the 2 mastering algorithms used are help vector machine (SVM) and logistic regression. Two deep
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s criti...
详细信息
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s critical to design and construct software that is both secure and *** security is the most well-defined aspect of health information software systems,it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same *** this league,it is crucial to determine those characteristics in the systems that can help in the accurate assessment of the sustainable-security of the health information software during the development *** research work employed the Fuzzy Analytic Network Process(Fuzzy ANP)to estimate the impact of the overall sustainable-security of health information software systems and their characteristics in order to achieve a high level of ***,the study validates the efficacy of the Fuzzy ANP procedure by testing it on five different versions of a health information software system through Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions(Fuzzy TOPSIS).Despite the sensitivity of the health information software systems,this study employedmultiple versions of health information software *** compared with the existing procedures for testing the sustainable-security of health information software systems,the outcomes were conclusive and significantly more *** saving time and resources,the mechanism suggested in this research work aims to establish an outline that software practitioners can follow to enhance the sustainablesecurity of health information software systems.
Large organizations including big IT firms and military organizations are interconnected through a large cyber network and these organizations are prone to highly sophisticated forms of cyber-attacks like Advanced Per...
详细信息
The successful and complete downlink transmission of critical data from an unmanned aerial vehicle (UAV) base station, such as control command and intelligence information, is essential for ground users to perform spe...
详细信息
暂无评论