DDoS attacks are among of the most dangerous forms of attack these days. They are the reason for many security issues in this era all around the globe, particularly in the landscape of SDN where core SDN controlllers ...
详细信息
In recent years, Distributed Denial of Service (DDoS) attacks have developed one of the greatest communal and disrupting threats to network security. These attacks flood focused systems with traffic, establishment the...
详细信息
To establish semantic associations between images and texts, existing Image-Text Retrieval (ITR) methods primarily focus on fixed-scale fragments, which only identify explicit semantic categories. Consequently, semant...
详细信息
In this study, a deep learning-based approach for detecting bone fractures in X-ray images, utilizing a MobileNetV2 architecture combined with Convolutional Neural Networks (CNNs). Fractures are a prevalent musculoske...
详细信息
Video Moment Retrieval (VMR) involves locating specific moments within a video based on natural language queries. However, existing VMR methods that employ various strategies for cross-modal alignment still face chall...
Virtual machine (VM) clusters are used in cloud computing models to safeguard resources from failure and provide redundancy. Tasks for cloud users are planned by choosing appropriate resources to carry out the work wi...
详细信息
The development of the Internet of Things (IoT) in multiple sectors has led to substantial security issues due to its decentralized structure and resource limits. To solve these problems, this paper proposes a novel t...
详细信息
The main theme of this book is network analysis and architecture design for network planning. While there are various types of networks, this book specifically focuses on computer networks for data communication. Ther...
In our project, we employed Natural Language Processing (NLP), Artificial Intelligence (AI), Generative Text Transformer (GTT), and Speech Recognition technologies. Through the utilization of these advanced technologi...
详细信息
The fast increase of network traffic in recent times causes significant detection of intrusions in Internet of Things (IoT) environments. Currently, Deep Learning (DL) models play a crucial role in cyber security for ...
详细信息
暂无评论