In an effort to increase computing efficiency, this work presents an improved spectral clustering technique that approximates the affinity matrix using Toeplitz and Circulant matrices. To preserve the quality of the c...
详细信息
This research investigates the efficacy of XLM-RoBERTa, a potent deep learning architecture rooted in transformer networks, for Part-of-Speech (POS) tagging—a foundational task in Natural Language Processing (NLP). T...
详细信息
In recent days the usage of android smartphones has increased exten-sively by *** are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more *** androi...
详细信息
In recent days the usage of android smartphones has increased exten-sively by *** are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more *** android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source *** the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth *** attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day *** the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature *** important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfi*** function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective *** our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners.
Chronic diabetes Mellitus (DM) leads to severe consequences such as nephropathy, neuropathy, and retinopathy. Various learning algorithms are employed to forecast and categorize eight issues, encompassing metabolic sy...
详细信息
Credit card fraud is an omnipresent threat in the digital era that cannot be effectively managed without complex detection and prevention strategies. Machine learning has become instrumental for the industry, principa...
详细信息
The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke...
详细信息
This study addresses the pressing issue of hate speech on online platforms. Traditional text-based analysis is no longer adequate for identifying hate speech due to the growth of internet platform data. The project ai...
详细信息
Pneumonia is a significant global health concern, especially for vulnerable populations such as children under five. Timely and accurate diagnosis is critical for effective treatment and improved patient outcomes. Thi...
详细信息
The availability of online resource is seriously threatened by the fatal DDoS (Distributed Denial of Service) attacks, which can earnestly break up a targeted network or website by flooding it with traffic. DDoS attac...
详细信息
Epilepsy is considered as a serious brain disorder in which patients frequently experience *** seizures are defined as the unexpected electrical changes in brain neural activity,which leads to *** researches made an i...
详细信息
Epilepsy is considered as a serious brain disorder in which patients frequently experience *** seizures are defined as the unexpected electrical changes in brain neural activity,which leads to *** researches made an intense effort for predicting the epileptic seizures using brain signal ***,they faced difficulty in obtaining the patients'characteristics because the model's distribution turned to fake predictions,affecting the model's *** addition,the existing prediction models have severe issues,such as overfitting and false positive *** overcome these existing issues,we propose a deep learning approach known as Deep dual‐patch attention mechanism(D^(2)PAM)for classifying the pre‐ictal signals of people with Epilepsy based on the brain *** neural network is integrated with D^(2)PAM,and it lowers the effect of differences between patients to predict *** multi‐network design enhances the trained model's generalisability and stability ***,the proposed model for processing the brain signal is designed to transform the signals into data blocks,which is appropriate for pre‐ictal *** earlier warning of epilepsy with the proposed model obtains the auxiliary *** data of real patients for the experiments provides the improved accuracy by D2PAM approximation compared to the existing *** be more distinctive,the authors have analysed the performance of their work with five patients,and the accuracy comes out to be 95%,97%,99%,99%,and 99%***,the numerical results unveil that the proposed work outperforms the existing models.
暂无评论