The dust collection on solar panels situated in solar parks is a common problem faced by PV system operators, particularly in arid and dusty regions. Dust deposition reduces the transparency of the panel surface, lead...
详细信息
The increasing integration of Cyber-Physical Systems (CPS) in critical infrastructure presents unique challenges for ensuring robust cybersecurity. Traditional Intrusion Detection Systems (IDS) often struggle with the...
详细信息
All biological functions, including vision, areaffected by timeof day. It is known that theretinal response to visual stimuli changes according to circadian rhythms. However, the effects on visually guided behavior we...
详细信息
Lung cancer continues to be a major contributor to cancer-related deaths globally, making it necessary to bring improvements in reliable and accurate detection methods. This study discusses lung cancer detection which...
详细信息
The drive for secure, open, and easily accessible voting systems has spurred the advance of decentralized blockchain-powered voting systems. This paper outlines the design and implementation of a decentralized voting ...
详细信息
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over t...
详细信息
ISBN:
(纸本)9798350352931
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over the last decade, the number of these computing systems - including desktops, laptops, smartphones, and the Internet of Things (IoT) - has skyrocketed. Among them, cell phones are practically integral to modern life. The popularity of web-based assaults has skyrocketed with the exponential growth in the number of individuals using the Internet. These web-based assaults are increasingly being combatted by security corporations. Unfortunately, new forms of these assaults are appearing all the time, making it hard for older security measures to stay up. Artificial intelligence (AI) is a source of optimism in the current cybersecurity landscape, offering a potential solution to the ever-changing digital dangers. The fast development of AI over the last decade has given rise to this optimism, because it is now impacting the expansion of every industry. With AI bringing so many advantages in every field, online security is one sector that just cannot afford to ignore it. This planned effort's work represents an advance in that direction. Critical online security issues have been the focus of this proposed work's study, which aims to address these issues using AI. Web security issues for desktop and mobile devices have been addressed in the proposed work. The planned work's contributions to online security are as follows: The 'MalCrawler' web crawler is a targeted tool for finding and exploring the web. This crawler makes it easy to gather websites, particularly ones that are harmful. It does a better job of collecting dangerous websites than a typical crawler. Additionally, it is built to circumvent the evasion strategies used by rogue websites. The crawler's ability to gather webpages - particularly dangerous ones - in order to provide datasets for ML-based an
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of *** resilience and imperceptibility are improved by choosing an appropriate embedding *** paper gives a novel system to immerse the secret information in different videos with different *** audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB *** Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD ***-audio is linked again with the stego-video in the third *** incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research *** spread spectrum approach is used to increase the complexity of secret data *** different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively.
Heart diseases, a primary cause of global fatalities, represent a growing social matter on a worldwide scale. The integration of machine learning with advancing technology has greatly benefited the medical field, resu...
详细信息
A line-fed Modified Hexagon shaped 2-port planar antenna is presented for 5G application. The MIMO antenna is designed through combining the techniques of a modifying the radiator and defected ground structure. In the...
详细信息
The Free Space Optics (FSO) is a high-speed connectivity system that has the same advantages of speed and bandwidth as that of optic fiber. In comparison to optic fiber, FSO is the preferred choice when it comes to co...
详细信息
暂无评论