Elevators serve as vital components in modern buildings, yet optimizing passengers' waiting time remains a crucial challenge. This study proposes a machine learning-based approach to enhance the efficiency of elev...
详细信息
Financial Fraud Detection Model (FFDM) is used to develop an advanced detection framework utilizing Graph Neural Networks (GNNs) to accurately identify fraudulent transactions within the transactions. Traditional frau...
详细信息
Nowadays, the world is becoming smarter, so as the technology, the new era is on the boom, which is blockchain because of its different use cases and benefits. The blockchain is a growing list of records called blocks...
详细信息
Pregnancy complications have significant effects on women and can threaten the health of an unborn child. Pregnant women have a great interest in issues related to fetuses. The aim of the project is to create a predic...
详细信息
Wireless Sensor Networks (WSNs) have advanced quickly due to the fast expansion of wireless networks. Yet, because of their ease of use and versatility, security concerns have grown. This means that conducting researc...
详细信息
ISBN:
(纸本)9798350348460
Wireless Sensor Networks (WSNs) have advanced quickly due to the fast expansion of wireless networks. Yet, because of their ease of use and versatility, security concerns have grown. This means that conducting research on intrusion protection in WSNs is now essential. Denial of Service (DoS) assaults are among the most common types of network attacks. They are dangerous because they take down the target network in order to accomplish their goal. Within WSNs, where devices function with limited resources, a denial-of-service attack has the potential to be disastrous. This research suggests a novel solution for WSNs, which are susceptible to assaults because to their devices' little storage capacity. To find abnormalities in DoS traffic within WSNs, the technique combines a Deep Convolutional Neural Network (DCNN) with Principal Component Analysis (PCA). By detecting and reducing the effects of DoS assaults, and by utilising the complementary capabilities of PCA and DCNN in this particular situation, the goal is to improve the security of WSNs. Compared with other traditional DL architectures, the proposed model has a more simplified structure and better feature extraction capabilities. This special combination gives it the power to quickly identify anomalous network activity in WSNs devices, especially those with limited storage. Because of its lightweight design, the suggested model addresses the inherent resource limits and guarantees optimal performance in the context of WSNs. A variety of assessment measures, such as confusion matrices, different classification metrics, and Receiver Operating Characteristic (ROC) curves, are used to verify the effectiveness of the suggested model. These metrics are used to evaluate the model's categorization performance in a rigorous manner. Extensive experimental comparisons reveal that the small size of the proposed model outperforms other popular models for anomalous traffic detection with regards to classification performance
The quality of teaching and learning process can be improved through innovative methods like use of virtual reality. We introduce EnVision, a groundbreaking Virtual Reality based approach to revolutionize Artificial I...
详细信息
This comprehensive review paper delves deeply into the realm of cloud-based data analytics platforms, underscoring their crucial role in propelling Business Intelligence (BI) forward during an era characterized by an ...
详细信息
Phishing URL detection is crucial in cybersecurity as malicious websites disguise themselves to steal sensitive information. Traditional machine learning techniques struggle to perform well in complex real-world scena...
详细信息
Multilingual speaker identification and verification is a challenging task, especially for languages with diverse acoustic and linguistic features such as Indo-Aryan and Dravidian languages. Previous models have strug...
详细信息
CMOS technology evolution enhances integrated circuits (ICs) performance characteristics at the cost of their increased susceptibility to radiation and thus to the occurrence of single-event upsets (SEUs) that may lea...
详细信息
暂无评论