Cyber attacks have increased in tandem with the exponential expansion of computer networks and network applications throughout the world. Fortunately, various machine/deep learning models have demonstrated excellent a...
详细信息
Immersive virtual reality offers novel approaches on live-teaching by challenging the idea of the physical classroom. Here we present our experiences and learnings from our work-inprogress on transferring a real-life ...
详细信息
In recent years, many Lesion segmentation (LS) models based on UNet have been proposed. However, existing researches rarely consider the influence of illumination change leads to the weak boundary area. Such as melano...
详细信息
Blockchain has become a popular paradigm for secure and immutable data storage. Despite its numerous applications across various fields, concerns regarding the user privacy and result integrity during data queries per...
详细信息
Myasthenia Gravis (MG) is a neuromuscular disease causing extreme muscular fatigue, triggering problems with vision, swallowing, speech, mobility, dexterity, and breathing. However, early detection and prediction of M...
详细信息
The Internet of Things(IoT)system has confronted dramatic growth in high dimensionality and data *** system named intrusion detection systems(IDS)is broadly utilized for the enhancement of security posture in an IT **...
详细信息
The Internet of Things(IoT)system has confronted dramatic growth in high dimensionality and data *** system named intrusion detection systems(IDS)is broadly utilized for the enhancement of security posture in an IT *** IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive ***,machine learning(ML)-related techniques were used for detecting intrusion in IoTs ***,the IoT IDS mechanism faces significant challenges because of physical and functional *** IoT features use every attribute and feature for IDS self-protection unrealistic and *** study develops a Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning(MM-WMVEDL)model for *** proposed MM-WMVEDL technique aims to discriminate distinct kinds of attacks in the IoT *** attain this,the presented MM-WMVEDL technique implements min-max normalization to scale the input *** feature selection purposes,the MM-WMVEDL technique exploits the Harris hawk optimization-based elite fractional derivative mutation(HHO-EFDM)*** the presented MM-WMVEDL technique,a Bi-directional long short-term memory(BiLSTM),extreme learning machine(ELM)and an ensemble of gated recurrent unit(GRU)models take place.A wide range of simulation analyses was performed on CICIDS-2017 dataset to exhibit the promising performance of the MM-WMVEDL *** comparison study pointed out the supremacy of the MM-WMVEDL method over other recent methods with accuracy of 99.67%.
As the primary cause of death globally, cardiovascular diseases (CVDs) demand precise and timely prediction to enhance patient outcomes. Other examples of conventional approaches for CVD prediction include statistical...
详细信息
Object identification in the area of computer Vision essentially focus on how robots are able to perceive in comparison of human eyes. The main task for vehicle detection is detecting vehicles from image sources. This...
详细信息
The highly volatile nature of cryptocurrencies, particularly Bitcoin, exhibits extreme price volatility, making accurate price prediction a challenging task for traditional forecasting models. This paper proposes an e...
详细信息
Interest in Wireless LAN 802.11 is climbing owing to its cost-effectiveness and simplicity of installation, yet its restricted Quality of Service (QoS) capabilities present obstacles for real-time apps. This endeavour...
详细信息
暂无评论