'DensePneumoNct' is a specialized deep learning algorithm designed for accurate and efficient detection of pneumonia from CT chest images. Leveraging the DenseNet architecture within TensorFlow, this algorithm...
详细信息
These days, the Internet of Medical Things (IoMT) is a new paradigm where different bio-sensors, such as invasive and non-invasive, generate data to monitor the healthcare of the human body. However, the IoMT applicat...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
N4-methylcytosine (4mC) is a common DNA methylation that has been implicated in epigenetic regulation and host defense. Accurate prediction of 4mC sites in DNA sequences will help to better explore the biological proc...
详细信息
In the healthcare field accumulation of vast amounts of data, known as big data, that contains valuable insights important for decision-making is available. The Data-driven approaches consistently proves their effecti...
详细信息
Disaster relief, police work, and environmental monitoring all benefit from satellite images. Objects and infrastructure in the images must be manually identified for these applications. Due to the large areas that ne...
详细信息
These days, the usage of industrial Internet of Things (IIoT), such as industrial robotics, smart homes, and electric, has been growing progressively. The IIoT applications consisted of different sensors and generated...
详细信息
In Mobile ad hoc Networks(MANETs),the packet scheduling process is considered the major challenge because of error-prone connectivity among mobile nodes that introduces intolerable delay and insufficient throughput wi...
详细信息
In Mobile ad hoc Networks(MANETs),the packet scheduling process is considered the major challenge because of error-prone connectivity among mobile nodes that introduces intolerable delay and insufficient throughput with high packet *** this paper,a Modified Firefly Optimization Algorithm improved Fuzzy Scheduler-based Packet Scheduling(MFPA-FSPS)Mechanism is proposed for sustaining Quality of Service(QoS)in the *** MFPA-FSPS mechanism included a Fuzzy-based priority scheduler by inheriting the merits of the Sugeno Fuzzy inference system that potentially and adaptively estimated packets’priority for guaranteeing optimal network *** further used the modified Firefly Optimization Algorithm to optimize the rules uti-lized by the fuzzy inference engine to achieve the potential packet scheduling *** adoption of a fuzzy inference engine used dynamic optimization that guaranteed excellent scheduling of the necessitated packets at an appropriate time with minimized waiting *** statistical validation of the proposed MFPA-FSPS conducted using a one-way Analysis of Variance(ANOVA)test confirmed its predominance over the benchmarked schemes used for investigation.
The term ''Web analytics'' pertains to the act of monitoring, analysing, and creating reports regarding the use of a website, such as its web pages, images, and videos. By utilising web analytics, busi...
详细信息
Attacks on the cyber space is getting exponential in recent *** penetrations and breaches are real threats to the individuals and *** security systems are good enough to detect the known threats but when it comes to A...
详细信息
Attacks on the cyber space is getting exponential in recent *** penetrations and breaches are real threats to the individuals and *** security systems are good enough to detect the known threats but when it comes to Advanced Persistent Threats(APTs)they *** APTs are targeted,more sophisticated and very persistent and incorporates lot of evasive techniques to bypass the existing ***,there is a need for an effective defense system that can achieve a complete reliance of *** address the above-mentioned issues,this paper proposes a novel honeypot system that tracks the anonymous behavior of the APT *** key idea of honeypot leverages the concepts of graph theory to detect such targeted *** proposed honey-pot is self-realizing,strategic assisted which withholds the APTs actionable tech-niques and observes the behavior for analysis and *** proposed graph theory based self learning honeypot using the resultsγ(C(n,1)),γc(C(n,1)),γsc(C(n,1))outperforms traditional techniques by detecting APTs behavioral with detection rate of 96%.
暂无评论