K-Nearest Neighbors (KNN), a simple and widely used algorithm, is extremely valuable in the field of machine learning models. Finding an optimal value of the nearest neighbor parameter in the KNN algorithm has been a ...
详细信息
Text-based password authentication is a common method used to verify the identity of users who are trying to access a secure system or service. In order to use this authentication method, the user must input a passwor...
详细信息
In an era marked by remarkable technological advancements, the way we create and share information has undergone a profound transformation. This paradigm shift is epitomized by the NextGen Dynamic Video Generator usin...
详细信息
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r...
详细信息
A critical challenge in implementing Zero trust (ZT) in Internet of Things (IoT) environments is ensuring secure authentication and authorization mechanisms. The work in this article delves into the intricate realm of...
详细信息
The problem with traditional notice boards is their static nature, leading to outdated information and manual effort to update. An IoT-based smart notice board solves this by providing real-time updates but requires a...
详细信息
Digital game-based learning (DGBL) has been viewed as an effective teaching strategy that encourages students to pick up and learn a subject. This paper explores its viability to help increase the reach and efficiency...
详细信息
Human-computer Interaction (HCI) is a dynamic field pi votal in shaping human-Technology relationships. HCI is a multidisciplinary field, essential in understanding and enhancing the interaction between humans and tec...
详细信息
Crop yield forecasting involves predicting the amount of crops that a farmer can expect from their field. This prediction is based on several factors, including soil type and environmental conditions. It is a crucial ...
详细信息
Phishing threats pose significant risks to online trading systems, threatening the security and integrity of financial transactions. In this paper, we present a comprehensive review of phishing threats and data securi...
详细信息
暂无评论