The proposed framework addresses the critical need for secure multimedia data sharing by integrating image-to-audio encryption with advanced AI-based data-hiding techniques. The core concept involves transforming stat...
详细信息
Named Entity Recognition (NER) is essential in the biomedical domain, particularly in mental health studies focused on disorders like depression. It helps extract structured information from unstructured text, enablin...
详细信息
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking c...
详细信息
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among *** paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics *** describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying *** use forensics techniques,Machine Learning(ML),and Deep Learning(DL)algorithms to exploit suspicious patterns to help the forensics investigation where every evidence contributes to the *** on a real-time dataset reveal better results for the detection of cyberbullying *** Random Forest in ML approach produces 87%of accuracy without SMOTE technique,whereas the value of F1Score produces a good result with SMOTE *** LSTM has 92%of validation accuracy in the DL algorithm compared with Dense and BiLSTM algorithms.
Mobile Edge computing(MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy *** this paper,we propose a flexible MECbased requirement-ad...
详细信息
Mobile Edge computing(MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy *** this paper,we propose a flexible MECbased requirement-adaptive partial offloading model to accommodate each user's specific preference regarding delay and energy *** address the dimensional differences between time and energy,we introduce two normalized parameters and then derive the computational overhead of processing *** from existing works,this paper considers practical variations in the user request patterns,and exploits a flexible partial offloading mode to minimize computation overheads subject to tolerable delay,task workload and power *** the resulting problem is non-convex,we decouple it into two convex subproblems and present an iterative algorithm to obtain a feasible offloading *** experiments show that our proposed scheme achieves a significant improvement in computation overheads compared with existing schemes.
Artificial intelligence-generated content (AIGC) has been proposed as a solution to meet the requirements of ultra-reliable, secure, and privacy-preserving connectivity in human digital twin (HDT) networks. In such an...
详细信息
A cloud-based system called Health Information Exchange (HIE) is. Hosted on Amazon Web Services (AWS). This system provides logins, for doctors, administrators and patients. The primary objective of this work is to re...
详细信息
Disasters affect a large number of people yearly and recurrently at many locations. Emergencies compel the local community to participate in disaster response;they are mostly the first responders during any disaster. ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
The simultaneous withdrawal of multiple WTGs after wind farm participation in frequency regulation will cause a large power plunge, which in turn will cause a serious secondary frequency drop in the system. Moreover, ...
详细信息
This research study provides a complete assessment of energy- and trust-aware techniques in IoT-WSNs, emphasizing the significant problems and limits of current methodologies. Traditional methodologies frequently face...
详细信息
暂无评论