Among women breast cancer is the second leading cause of cancer. Emergence of Artificial Intelligence(AI) in the medical care leads to good survival rate by diagnosing and effective prognosis of the breast cancer pati...
详细信息
Eye tracking is a method of measuring and analyzing the movements of the eyes as they move and focus on different objects in the visual field. This technique has been used in a wide range of fields, including psycholo...
详细信息
In recent years, the demand for high-resolution remote sensing imaging has increased in a variety of fields, including environmental monitoring, urban planning, agriculture, and disaster management. Multispectral imag...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection Systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
Firstly, we know that the RSA/Discrete Logarithm assumptions don’t support devices with low computing. The factorization with discrete logarithm assumption uses only simple algebraic operations such as matrix multipl...
详细信息
The initiative examines the efficiency of various maze-solving algorithms, including breadth-first search (BFS), depth-first search (DFS), A∗ search, Markov decision processes with policy iteration (MDP PI), value ite...
详细信息
This study aims to reveal the complex socioeconomic structure of Indian villages by utilizing a dataset obtained from several government sources, which includes a wide range of 150 distinct variables. This study inten...
详细信息
With this flood of multimedia data, protecting it is an absolute necessity. This paper describes a complete method for securing images that combines encryption and watermarking. A technique of the sort suggested furth...
详细信息
A next-generation canteen management system is proposed that employs intelligent software agents to streamline various tasks, such as order processing and customer service, within canteens. The system automates verifi...
详细信息
A comparative analysis of algorithms for the Traveling Salesman Problem (TSP) is proposed that evaluates four distinct approaches: Nearest neighbor (NN), 2-opt algorithm, Genetic Algorithm (GA), Simulated Annealing (S...
详细信息
暂无评论