Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
As a semantics for conditional knowledge bases, ranking functions order possible worlds by mapping them to a degree of plausibility. c-Representations are special ranking functions that are obtained by assigning indiv...
详细信息
Inductive inference operators have been introduced to formalize the process of completing a conditional belief base to a full inference relation. In this paper, we investigate the approximation of inductive inference ...
详细信息
Medical image segmentation is a crucial process for computer-aided diagnosis and *** image segmentation refers to portioning the images into small,disjointed parts for simplifying the processes of analysis and *** and...
详细信息
Medical image segmentation is a crucial process for computer-aided diagnosis and *** image segmentation refers to portioning the images into small,disjointed parts for simplifying the processes of analysis and *** and speckle noise are different types of noise in magnetic resonance imaging(MRI)that affect the accuracy of the segmentation process ***,image enhancement has a significant role in MRI *** paper proposes a novel framework that uses 3D MRI images from Kaggle and applies different diverse models to remove Rician and speckle noise using the best possible noise-free *** proposed techniques consider the values of Peak Signal to Noise Ratio(PSNR)and the level of noise as inputs to the attention-U-Net model for segmentation of the *** framework has been divided into three stages:removing speckle and Rician noise,the segmentation stage,and the feature extraction *** framework presents solutions for each problem at a different stage of the *** the first stage,the framework uses Vibrational Mode Decomposition(VMD)along with Block-matching and 3D filtering(Bm3D)algorithms to remove the ***,the most significant Rician noise-free images are passed to the three different methods:Deep Residual Network(DeRNet),Dilated Convolution Auto-encoder Denoising Network(Di-Conv-AE-Net),andDenoising Generative Adversarial Network(DGAN-Net)for removing the speckle *** Bm3D have achieved PSNR values for levels of noise(0,0.25,0.5,0.75)for reducing the Rician noise by(35.243,32.135,28.214,24.124)and(36.11,31.212,26.215,24.123)*** framework also achieved PSNR values for removing the speckle noise process for each level as follows:(34.146,30.313,28.125,24.001),(33.112,29.103,27.110,24.194),and(32.113,28.017,26.193,23.121)forDeRNet,Di-Conv-AE-Net,and DGAN-Net,*** experiments that have been conducted have proved the efficiency of the proposed framework a
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard ***,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been *** using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to *** of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization *** the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed *** to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance *** other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and *** results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection.
Web Application Firewall (WAF) systems play a vital role in protecting web applications from various security vulnerabilities. However, existing WAF solutions are often costly and complex to configure, limiting their ...
详细信息
The only recently introduced System W is a nonmonotonic inductive inference operator exhibiting some notable properties like extending rational closure and satisfying syntax splitting postulates for inference from con...
详细信息
Yoga pose detection and classification have garnered considerable attention in recent years due to their significant applications in various domains, including fitness, health monitoring, and rehabilitation programs. ...
详细信息
In recent years, Artificial Intelligence technology has excelled in various tasks and is taking the world by storm. However, the various transformations in neural networks make it difficult to make sense of the reason...
详细信息
暂无评论