With the increasing number of Software-as-a-Service (SaaS) users, catering to their diverse needs while ensuring Quality of Service (QoS) has become imperative. Although SaaS providers regularly introduce new applicat...
详细信息
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer ...
详细信息
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer *** have paid a lot of attention to gait recognition,specifically the identification of people based on their walking patterns,due to its potential to correctly identify people far *** recognition systems have been used in a variety of applications,including security,medical examinations,identity management,and access *** systems require a complex combination of technical,operational,and definitional *** employment of gait recognition techniques and technologies has produced a number of beneficial and well-liked *** proposes a novel deep learning-based framework for human gait classification in video *** framework’smain challenge is improving the accuracy of accuracy gait classification under varying conditions,such as carrying a bag and changing *** proposed method’s first step is selecting two pre-trained deep learningmodels and training fromscratch using deep transfer ***,deepmodels have been trained using static hyperparameters;however,the learning rate is calculated using the particle swarmoptimization(PSO)***,the best features are selected from both trained models using the Harris Hawks controlled Sine-Cosine optimization *** algorithm chooses the best features,combined in a novel correlation-based fusion ***,the fused best features are categorized using medium,bi-layer,and tri-layered neural *** the publicly accessible dataset known as the CASIA-B dataset,the experimental process of the suggested technique was carried out,and an improved accuracy of 94.14% was *** achieved accuracy of the proposed method is improved by the recent state-of-the-art techniques that show the significance of this wor
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT ga...
详细信息
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT gadget ***-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)*** this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their *** recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying *** current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT *** presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT *** accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square *** detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this ***,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition *** proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct *** comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth...
详细信息
Extensive integration of inverter-based resources (IBRs) has introduced stability challenges to power grids due to their low-inertia nature and grid-following control configuration. To address these challenges, recent...
详细信息
We propose an ASIC architecture for key switching in RNS-CKKS Homomorphic Encryption scheme. With the pipeline design, the frequent RAM access is avoided and high throughput is achieved. This key switching design is a...
详细信息
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov...
详细信息
With the advent of generative artificial intelligence (AI), the scope of data analysis, prediction of performances, real-time feedback, etc. in learning analytics has widened. The purpose of this study is to explore t...
详细信息
This study investigates the effectiveness of haptic feedback in hand rehabilitation exercises, within both virtual reality (VR) and real-world settings, to enhance upper limb functionality in post-stroke recovery. We ...
详细信息
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
暂无评论