The condition of the ocean is monitored through a network of acoustic sensor nodes. After the transmitter and receiver nodes are formed, they are placed in a shallow sea environment. Underwater communication takes mor...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
The heuristics in mixed- integer linear programming (MILP) solvers are mostly general-purpose, which can only recognize some common structures. It sometimes may be challenging for them to obtain a high-quality feasibl...
详细信息
Forensic investigations rely heavily on the accurate detection and analysis of crime related objects present at crime scenes. Traditional methods of object detection often involve manual labor and are error prone proc...
详细信息
As the globe transitions to the internet age, software has emerged as the factor primarily essential to the success of the digital realm. Software now permeates every aspect of daily existence in the age of computers....
详细信息
The COVID-19 epidemic has had a huge impact on the educational landscape, prompting the adoption of online and remote learning as viable alternatives to conventional in-person instruction. In order to create effective...
详细信息
Individuals with sensorineural hearing loss often experience difficulty comprehending speech when background noise is present. This paper investigates the extent of this problem in various listening scenarios and with...
详细信息
Signal processing based research was adopted with Electroencephalogram(EEG)for predicting the abnormality and cerebral *** proposed research work is intended to provide an automatic diagnostic system to determine the ...
详细信息
Signal processing based research was adopted with Electroencephalogram(EEG)for predicting the abnormality and cerebral *** proposed research work is intended to provide an automatic diagnostic system to determine the EEG signal in order to classify the brain function which shows whether a person is affected with schizophrenia or *** detection and intervention are vital for better ***,the diagnosis of schizophrenia still depends on clinical observation to *** reliable biomarkers,schizophrenia is difficult to detect in its early phase and hence we have proposed this *** this work,the EEG signal series are divided into non-linear feature mining,classification and validation,and t-test integrated feature selection *** this work,19-channel EEG signals are utilized from schizophrenia class and normal ***,the datasets initially execute the splitting process based on raw 19-channel EEG into 6250 sample point’s *** this process,1142 features of normal and schizophrenia class patterns can be *** other hand,157 features from each EEG patterns are utilized based on Non-linear feature extraction process where 14 principal features can be identified in terms of considering the essential *** last,the Deep Learning(DL)technique incorporated with an effective optimization technique is adopted for classification process called a Deep Convolutional Neural Network(DCNN)with mayfly optimization *** proposed technique is implemented into the platform of MATLAB in order to obtain better results and is analyzed based on the performance analysis framework such as accuracy,Signal to Noise Ratio(SNR),Mean Square Error,Normalized Mean Square Error(NMSE)and *** comparison,the proposed technique is proved to a better technique than other existing techniques.
Recommendation systems are often used to deliver consumers a customised set of services. Their main purpose is to provide recommendations or concepts (such as restaurants, tourist attractions, medicines, movies, etc.)...
详细信息
Aims/Background: Twitter has rapidly become a go-to source for current events coverage. The more people rely on it, the more important it is to provide accurate data. Twitter makes it easy to spread misinformation, wh...
详细信息
暂无评论