Stock prediction and portfolio management are vital in the financial industry, aiding investors in informed decisions. This study introduces a novel approach termed the Stock Prediction and Portfolio Management Model,...
详细信息
In the field of cybersecurity, the ongoing issue of phishing attacks is still of utmost concern because it puts both individuals and companies at serious risk. In order to prevent these fraudulent efforts and protect ...
详细信息
A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on *** paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)*** is the consecutive selection of suitable re...
详细信息
A Mobile Ad hoc NETwork(MANET)is a self-configuring network that is not reliant on *** paper introduces a new multipath routing method based on the Multi-Hop Routing(MHR)*** is the consecutive selection of suitable relay nodes to send information across nodes that are not within direct range of each *** to ensure good MHR leads to several negative consequences,ultimately causing unsuccessful data transmission in a *** research work consists of three *** first to attempt to propose an efficient MHR protocol is the design of Priority Based Dynamic Routing(PBDR)to adapt to the dynamic MANET environment by reducing Node Link Failures(NLF)in the *** is achieved by dynamically considering a node’s mobility parameters like relative velocity and link duration,which enable the next-hop *** method works more efficiently than the traditional *** the second stage is the Improved Multi-Path Dynamic Routing(IMPDR).The enhancement is mainly focused on further improving the Quality of Service(QoS)in MANETs by introducing a QoS timer at every node to help in the QoS routing of *** QoS is the most vital metric that assesses a protocol,its dynamic estimation has improved network performance *** method uses distance,linkability,trust,and QoS as the four parameters for the next-hop *** is compared against traditional routing *** Network Simulator-2(NS2)is used to conduct a simulation analysis of the protocols under *** proposed tests are assessed for the Packet Delivery Ratio(PDR),Packet Loss Rate(PLR),End-to-End Delay(EED),and Network Throughput(NT).
The Internet universal connectivity is both a boon and a breeding ground for phishing attacks, manipulating unsuspecting users into interacting with harmful links that redirect them to deceptive websites aiming to pil...
详细信息
In this modern digital era, the increasing volume of textual data and the widespread adoption of natural language processing (NLP) techniques have presented a critical challenge in safeguarding sensitive privacy infor...
详细信息
In this modern digital era, the increasing volume of textual data and the widespread adoption of natural language processing (NLP) techniques have presented a critical challenge in safeguarding sensitive privacy information. As a result, there is a pressing demand to design robust and accurate NLP-based techniques to perform efficient sensitive information detection in textual data. This research paper focuses on the detection and classification of sensitive privacy information in textual documents using NLP by proposing a novel algorithm named Privacy BERT-LSTM. The proposed Privacy BERT-LSTM algorithm employs BERT for obtaining contextual embeddings and LSTM for sequential information processing, facilitating efficient sensitive information detection in textual documents. The BERT with its bidirectional characteristics captures the nuances and meaning of the textual documents, while the LSTM derives the long-range dependencies in the textual data. Moreover, the proposed Privacy BERT-LSTM algorithm with its attention mechanism highlights the important regions of the textual documents, contributing to efficient sensitive information detection. The comprehensive performance evaluation is conducted by employing the SMS Spam Collection dataset in terms of standard performance metrics and comparing it with different state-of-the-art techniques, namely, CASSED, PRIVAFRAME, CNN-LSTM, Conv-FFD, GCSA, TSIIP, and, C-PIIM. The experimental outcomes clearly illustrate that the Privacy BERT-LSTM algorithm demonstrates superior performance in identifying various types of sensitive information by achieving an accuracy of 92.50%, F1-score of 85.02%, and Precision of 89.36%. The proposed algorithm outperforms existing baseline models, providing valuable advancements in sensitive information detection using NLP. Therefore, this research contributes to the advancement of privacy protection in NLP applications and opens avenues for future investigations in the domain of sensitive info
Normal people typically communicate using voice, while deaf individuals use sign language to communicate with each other. However, a challenge arises when deaf people need to interact with those who do not understand ...
详细信息
Sign language is a way of communication that uses hand shapes, orientation, movements, and facial expressions to express instead of spoken words like normal language. Different regions have developed their own version...
详细信息
Machine learning-based systems have emerged as the primary means for achieving the highest levels of productivity and efficiency. They have become the most influential competitive factor for many technologies and busi...
详细信息
This paper presents machine learning-based strategies for mitigating the problem of misinformation in social media, with a special focus on political misinformation detection and clickbait detection. The following res...
详细信息
The creation of binary and multi-classification models with the goal of accurately detecting and categorizing motor defects is important to study. This work explores how autoencoders can be used to apply self-supervis...
详细信息
暂无评论