As the self-driving technology is getting mature for public transportation applications, the safety concern of onboard passengers has become an important issue. It is essential to identify inappropriate or hazardous b...
详细信息
Breast Cancer, with an expected 42,780 deaths in the US alone in 2024, is one of the most prevalent types of cancer. The death toll due to breast cancer would be very high if it were to be totaled up globally. Early d...
详细信息
Background: In the wake of escalating cyber threats and the indispensability of ro-bust network security mechanisms, it becomes crucial to understand the evolving landscape of cryptographic research. Recognizing the s...
详细信息
Blockchain is one of the emerging technologies that are applied in various fields and its application in Healthcare 4.0 is crucial to handle the vast amount of health records that are growing continuously everyday. Th...
详细信息
This article proposes a multimodal sentiment analysis system for recognizing a person’s aggressiveness in pain. The implementation has been divided into five components. The first three steps are related to a text-ba...
详细信息
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively un...
详细信息
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively unless they are combined with additional algorithms that can alter the classifier’s parameters or select the optimal sub-set of features for the *** are used in tandem with classifiers to increase the stability and with efficiency of the classifiers in detecting *** algorithms,on the other hand,have a number of limitations,particularly when used to detect new types of *** this paper,the NSL KDD dataset and KDD Cup 99 is used to find the performance of the proposed classifier model and compared;These two IDS dataset is preprocessed,then Auto Cryptographic Denoising(ACD)adopted to remove noise in the feature of the IDS dataset;the classifier algorithms,K-Means and Neural network classifies the dataset with adam *** classifier is evaluated by measuring performance measures like f-measure,recall,precision,detection rate and *** neural network obtained the highest classifying accuracy as 91.12%with drop-out function that shows the efficiency of the classifier model with drop-out function for KDD Cup99 *** their power and limitations in the proposed methodology that could be used in future works in the IDS area.
This paper aims to frame a new rice disease prediction model that included three major ***,median filtering(MF)is deployed during pre-processing and then‘proposed Fuzzy Means Clustering(FCM)based segmentation’is ***...
详细信息
This paper aims to frame a new rice disease prediction model that included three major ***,median filtering(MF)is deployed during pre-processing and then‘proposed Fuzzy Means Clustering(FCM)based segmentation’is *** that,‘Discrete Wavelet Transform(DWT),Scale-Invariant Feature Transform(SIFT)and low-level features(colour and shape),Proposed local Binary Pattern(LBP)based features’are extracted that are classified via‘MultiLayer Perceptron(MLP)and Long Short Term Memory(LSTM)’and predicted outcomes are *** exact prediction,this work intends to optimise the weights of LSTM using Inertia Weighted Salp Swarm Optimisation(IW-SSO)***,the development of IW-SSO method is established on varied metrics.
Fog computing became a traditional OffLad Destination(OLD)to compute the offloaded tasks of the Internet of Vehicles(IoV).Nevertheless,the limited computing resources of the fog node leads to re-offload these tasks to...
详细信息
Fog computing became a traditional OffLad Destination(OLD)to compute the offloaded tasks of the Internet of Vehicles(IoV).Nevertheless,the limited computing resources of the fog node leads to re-offload these tasks to the neighboring fog nodes or the ***,the IoV will incur additional offloading *** this paper,we propose a new offloading scheme by utilizing RoadSide Parked Vehicles(RSPV)as an alternative OLD for *** idle computing resources of the RSPVs can compute large tasks with low offloading costs compared with fog nodes and the ***,a performance evaluation of the proposed scheme has been presented and discussed with other benchmark offloading schemes.
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
Generating financial reports from a piece of news is a challenging task due to the lack of sufficient background knowledge to effectively generate long financial reports. To address this issue, this article proposes a...
详细信息
暂无评论