The evolution of social networks has resulted in medium to express feelings and thoughts of an individual to global audience, thanks to the rapid expansion of the Internet. Many individual utilize textual content, ima...
详细信息
This project focuses on developing a deep learning algorithm to classify eye diseases from images. The dataset comprises images depicting various eye conditions, including glaucoma, cataracts, normal eyes, and diabeti...
详细信息
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over t...
详细信息
ISBN:
(纸本)9798350352931
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over the last decade, the number of these computing systems - including desktops, laptops, smartphones, and the Internet of Things (IoT) - has skyrocketed. Among them, cell phones are practically integral to modern life. The popularity of web-based assaults has skyrocketed with the exponential growth in the number of individuals using the Internet. These web-based assaults are increasingly being combatted by security corporations. Unfortunately, new forms of these assaults are appearing all the time, making it hard for older security measures to stay up. Artificial intelligence (AI) is a source of optimism in the current cybersecurity landscape, offering a potential solution to the ever-changing digital dangers. The fast development of AI over the last decade has given rise to this optimism, because it is now impacting the expansion of every industry. With AI bringing so many advantages in every field, online security is one sector that just cannot afford to ignore it. This planned effort's work represents an advance in that direction. Critical online security issues have been the focus of this proposed work's study, which aims to address these issues using AI. Web security issues for desktop and mobile devices have been addressed in the proposed work. The planned work's contributions to online security are as follows: The 'MalCrawler' web crawler is a targeted tool for finding and exploring the web. This crawler makes it easy to gather websites, particularly ones that are harmful. It does a better job of collecting dangerous websites than a typical crawler. Additionally, it is built to circumvent the evasion strategies used by rogue websites. The crawler's ability to gather webpages - particularly dangerous ones - in order to provide datasets for ML-based an
This research delves into the prompt identification and prediction of Polycystic Ovary Syndrome utilizing machine learning, specifically focusing on the XGBoost algorithm. Through an examination of data gathered from ...
详细信息
Next-generation intelligent transportation systems aim to achieve many cooperative perception and cooperative driving functions that require considerable computational resources. Offloading such tasks via mobile edge ...
详细信息
In the current landscape of online data services,data transmission and cloud computing are often controlled separately by Internet Service Providers(ISPs)and cloud providers,resulting in significant cooperation challe...
详细信息
In the current landscape of online data services,data transmission and cloud computing are often controlled separately by Internet Service Providers(ISPs)and cloud providers,resulting in significant cooperation challenges and suboptimal global data service *** this study,we propose an end-to-end scheduling method aimed at supporting low-latency and computation-intensive medical services within local wireless networks and healthcare *** approach serves as a practical paradigm for achieving low-latency data services in local private cloud *** meet the low-latency requirement while minimizing communication and computation resource usage,we leverage Deep Reinforcement Learning(DRL)algorithms to learn a policy for automatically regulating the transmission rate of medical services and the computation speed of cloud ***,we utilize a two-stage tandem queue to address this problem *** experiments are conducted to validate the effectiveness for our proposed method under various arrival rates of medical services.
The term sentiment analysis deals with sentiment classification based on the review made by the user in a social *** sentiment classification accuracy is evaluated using various selection methods,especially those that d...
详细信息
The term sentiment analysis deals with sentiment classification based on the review made by the user in a social *** sentiment classification accuracy is evaluated using various selection methods,especially those that deal with algorithm *** this work,every sentiment received through user expressions is ranked in order to categorise sentiments as informative and *** order to do so,the work focus on Query Expansion Ranking(QER)algorithm that takes user text as input and process for sentiment analysis andfinally produces the results as informative or *** challenge is to convert non-informative into informative using the concepts of classifiers like Bayes multinomial,entropy modelling along with the traditional sentimental analysis algorithm like Support Vector Machine(SVM)and decision *** work also addresses simulated annealing along with QER to classify data based on sentiment *** the input volume is very fast,the work also addresses the concept of big data for information retrieval and *** result com-parison shows that the QER algorithm proved to be versatile when compared with the result of *** work uses Twitter user comments for evaluating senti-ment analysis.
The recent emergence of Large Language Model (LLM)-based tools such as OpenAI's ChatGPT and Google's Gemini has sparked excitement across the software development industry, and offered promises to transform th...
详细信息
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block...
详细信息
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is *** order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block *** is no need to put the whole transaction on the chain when verifying block *** just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for ***,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the *** the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the ***,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification.
Micro-expressions are spontaneous, rapid and subtle facial movements that can hardly be suppressed or fabricated. Micro-expression recognition (MER) is one of the most challenging topics in affective computing. It aim...
详细信息
暂无评论