Complex forgeries such as deepfakes, which are very popular today, as well as very simple but effective manipulation techniques, the production of which does not require the use of deep networks such as GAN, are still...
详细信息
Wireless sensor networks (WSNs) are networks with many sensor nodes that are utilized for various purposes, including the military and medical. In hazardous circumstances, precise data aggregation and routing are esse...
详细信息
Emotions are very important when it comes to collective understanding among people. In recent times, emotion recognition has emerged as a crucial facet within the realm of effective computing. Many physiological signa...
详细信息
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing **...
详细信息
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing ***,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to ***,it is imperative to utilize sophisticated algorithms to address this *** learning is a highly effective approach for identifying and uncovering these harmful *** learning(ML)approaches can identify common characteristics in most phishing *** this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing *** that,we used the normalization technique on the dataset to transform the range of all the features into the same *** findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best *** in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction ***,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate.
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ...
详细信息
Companies or organizations usually use key performance indicators (KPI) as indicators to determine their performance. The company's performance achievements are reflected in the set indicators that will describe t...
详细信息
Urban Air Mobility (UAM) is the envisioned future of inter-city aerial transportation. This paper presents a novel, in-flight connectivity link allocation method for UAM, which dynamically switches between terrestrial...
详细信息
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var...
详细信息
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability,underscoring the critical importance of robust cybersecurity *** paper advocates for leveraging machine learning(ML)to address variability management issues and fortify the security of *** the context of the broader special issue theme on innovative cybersecurity approaches,our proposed ML-based framework offers an interdisciplinary perspective,blending insights from computing,social sciences,and ***,it employs ML for demand analysis,dynamic feature extraction,and enhanced feature selection in distributed settings,contributing to cyber-resilient *** experiments demonstrate the framework’s superiority,emphasizing its potential to boost productivity and security in *** digital threats evolve,this research catalyzes interdisciplinary collaborations,aligning with the special issue’s goal of breaking down academic barriers to strengthen digital ecosystems against sophisticated attacks while upholding ethics,privacy,and human values.
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p...
详细信息
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it ...
详细信息
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it goes to excess, resulting in light pollution;environmental impacts;impacts on fauna and flora;and, even more serious, impacts on human health. But it has also been an essential driving force in the evolution of humanity. From the first traces of the mastery of fire as a light source up to the "electronic" light of LEDs, we will travel through more than 500,000 years of history of lighting technologies and more particularly focus on the last 150 years, which have ended with the LED revolution.
暂无评论