Heart disease (HD) stands as a major global health challenge, being a predominant cause of death and demanding intricate and costly detection methods. The widespread impact of heart failure, contributing to increased ...
详细信息
This research article investigates stability problems for the type of linear neutral systems involving multiple time delay parameters in state variables and multiple neutral delay parameters in time derivative of stat...
详细信息
Currently, wind power is the fastest-growing sus-tainable energy resource, and accurately predicting wind velocity for individual turbines is essential. Wind behavior is turbulent, with variable patterns, characterist...
详细信息
This work presents a highly effective strategy for attacking image captioning models through the use of prompt engineering. The objective of this approach is to deliberately guiding the output of LLMs and introduce dy...
详细信息
Prosthetic hands can be essential for those without a biological hand(s) to accomplish everyday tasks but the cost, of up to tens of thousands, keeps them out of reach for many people. This paper reports on the develo...
详细信息
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its ***,researchers have tried to generate a new natural image driven from only the secret messag...
详细信息
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its ***,researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it;this is called the stego *** paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response(QR)code and maze game image *** system consists of two *** first component contains two processes,encryption process,and hiding *** encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game *** the other hand,the second component contains two processes,extraction and decryption,which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image,*** results were obtained using the bit error rate(BER)*** results confirmed that the system achieved high hiding capacity,good performance,and a high level of robustness against attackers compared with other coverless steganography methods.
Context-aware fire detection is a significant task in the era of new urban monitoring. Severe damage might result from fire events. To minimize the occurrence of these events, timely detection of fire accidents is nec...
详细信息
Deep learning (DL) data-driven models (DDMs) offer significant potential for predicting nonlinear events, particularly in the absence of an analytical or known mathematical foundation. This study provides the first em...
详细信息
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active...
详细信息
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called *** deep learning approaches and the machine learning are c...
详细信息
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called *** deep learning approaches and the machine learning are compared in the proposed system for presenting the methodology that can detect phishing websites via Uniform Resource Locator(URLs)*** legal class is composed of the home pages with no inclusion of login forms in most of the present modern solutions,which deals with the detection of ***,the URLs in both classes from the login page due,considering the representation of a real case scenario and the demonstration for obtaining the rate of false-positive with the existing approaches during the legal login pages provides the test having *** addition,some model reduces the accuracy rather than training the base model and testing the latest *** addition,a feature analysis is performed on the present phishing domains to identify various approaches to using the phishers in the campaign.A new dataset called the MUPD dataset is used for ***,a prediction model,the Dense forward-backwards Long Short Term Memory(LSTM)model(d−FBLSTM),is presented for combining the forward and backward propagation of LSMT to obtain the accuracy of 98.5%on the initiated login URL dataset.
暂无评论