The need for cybersecurity has increased manifold over the past decade due to an unprecedented shift towards digital. With the increase in the number and sophistication of threats, cybersecurity experts have been forc...
The need for cybersecurity has increased manifold over the past decade due to an unprecedented shift towards digital. With the increase in the number and sophistication of threats, cybersecurity experts have been forced to seek out new and efficient ways to secure endpoints on a network. Machine learning provides one such solution. This paper discusses how IoT devices are threatened and the need for endpoint security. It overviews different Machine learning-based intrusion detection systems that are currently in use e.g., STAT, Haystack, etc., and other Endpoint Detection and Response Techniques.
Motivated by the particle swarm optimization (PSO) and quantum computing theory, we have presented a quantum variant of PSO (QPSO) mutated with Cauchy operator and natural selection mechanism (QPSO-CD) from evolutiona...
详细信息
Data mining is a viable innovation to break down and extract patterns from crude information, which can change the original data into up-to-date information. Predictive analytics includes an assortment of factual syst...
详细信息
ISBN:
(数字)9781728127910
ISBN:
(纸本)9781728127927
Data mining is a viable innovation to break down and extract patterns from crude information, which can change the original data into up-to-date information. Predictive analytics includes an assortment of factual systems that analyze present and historical facts to make forecasts about future or generally obscure occasions. Machine learning incorporates statistical methods for regression and classification. The objective of machine learning is to create a predictive model that is unclear from the correct model. The assessed relative execution qualities were evaluated by Ein-Dor and feldermesser utilizing a linear regression method considering the properties machine cycle time, minimum main memory, maximum main memory, cache memory, minimum channels, and maximum channels. This relationship is communicated as a mathematical statement that predicts the reaction variable published relative performance as a linear function of the parameters. The proposed technique utilizes machine learning work to re-phrase prediction as an optimization problem. Confidence prediction and polynomial regression include imaginative application utilization and promising research. The experimental evaluation platform contains detailed performance analysis of the preferred methods. It is expected that this machine learning approach gives a quick and straightforward approach to fabricate applications.
Genes expression datasets are considered to be high dimensional dataset. It is very much needed that before predicting the genes expression dimensionality reduction must be performed. Machine learning algorithms fail ...
详细信息
Genes expression datasets are considered to be high dimensional dataset. It is very much needed that before predicting the genes expression dimensionality reduction must be performed. Machine learning algorithms fail to analyze genes expression due to its high dimensionality behaviour. These algorithms have to perform feature selection or feature extraction before classification. To overcome this dimensionality reduction approach deep learning algorithms are implemented which has shown improved performance. This paper is also based on the approach of deep learning algorithm which is based on a classification approach using hybridization of a deep neural network named Hybrid Deep Neural Network (HDNN) in which Convolutional Neural Networks are combined with Recurrent Neural Networks to perform prediction. Parameters like accuracy, AUC, precision, and F1score have shown improved performance than other state of art algorithms with 85.5%, 0.84, 0.81, and 0.79 respectively.
Bitcoin system (or Bitcoin) is a peer-to-peer and decentralized payment system that uses cryptocurrency named bitcoins (BTCs) and was released as open-source software in 2009. Bitcoin platform has attracted both socia...
详细信息
ISBN:
(数字)9781728187556
ISBN:
(纸本)9781728193106
Bitcoin system (or Bitcoin) is a peer-to-peer and decentralized payment system that uses cryptocurrency named bitcoins (BTCs) and was released as open-source software in 2009. Bitcoin platform has attracted both social and anti-social elements. On the one hand, it is social as it ensures the exchange of value, maintaining trust in a cooperative, community-driven manner without the need for a trusted third party. At the same time, it is anti-social as it creates hurdles for law enforcement to trace suspicious transactions due to anonymity and privacy. To understand how the social and anti-social tendencies in the user base of Bitcoin affect its evolution, there is a need to analyze the Bitcoin system as a network. The current paper aims to explore the local topology and geometry of the Bitcoin network during its first decade of existence. Bitcoin transaction data from 01 Jan 2016 00:00:00 GMT to 08 May 2020 13:21:33 GMT was processed for this purpose to build a Bitcoin user graph.
作者:
Andrew MosesG. Bharadwaja KumarStudent
School of Computer Science and Engineering Vellore Institute of Technology Chennai India Professor
School of Computer Science and Engineering Vellore Institute of Technology Chennai India
In today's technology-driven world, most millennials are tech-savvy. They have neither the time nor the interest in reading textbooks, newspapers or journals. They would like to immediately get instant answers and...
In today's technology-driven world, most millennials are tech-savvy. They have neither the time nor the interest in reading textbooks, newspapers or journals. They would like to immediately get instant answers and clarifications for all their doubts and questions. On many occasions, we are unable to find the exact word or meaning which we are searching for. So, if we have a clear, concise summary of a piece of literature, and we could understand what it contains with just a glimpse, we would be able to save a lot of time. This paper dwells about utilizing Natural Language Processing (NLP) to summarize a given text/textbook/paper. The state-of-the-art technology in this field has been demonstrated by Google's Bidirectional Encoder Representations from Transformers (BERT), one of the latest developments in NLP. BERT is believed to understand English better than other models because of its underlying bidirectional architecture. The present proposal is to use BERT as a sentence similarity extractor. By applying the TextRank algorithm, the sentences holding the most important information are extracted. This comes under the domain of extractive summarization. Abstractive summarization is much talked about, but since Google BERT is not built for generating text, we are utilizing it in a different way to achieve the requirement. This paper intends to discuss the use of BERT for the gen-next kids which will save time and initiate further interest for researchers in developing new programs continuously in the future.
Right from the very beginning, the text has vital importance in human life. As compared to the vision-based applications, preference is always given to the precise and productive information embodied in the text. Cons...
详细信息
ISBN:
(数字)9781728169262
ISBN:
(纸本)9781728169279
Right from the very beginning, the text has vital importance in human life. As compared to the vision-based applications, preference is always given to the precise and productive information embodied in the text. Considering the importance of text, recognition, and detection of text is also equally important in human life. This paper presents a deep analysis of recent development on scene text and compare their performance and bring into light the real modern applications. Future potential directions of scene text detection and recognition are also discussed.
Profound Learning (DL) is an innovation that repeats the manner in which the human mind’s capabilities with regard to deciphering information and showing up at choices. DL was created by Google and IBM. DL and brain ...
详细信息
Profound Learning (DL) is an innovation that repeats the manner in which the human mind’s capabilities with regard to deciphering information and showing up at choices. DL was created by Google and IBM. DL and brain networks have a wide assortment of uses, some of which incorporate discourse acknowledgement, normal language handling (NLP), and PC vision. In the field of medical care, it has been put to use in the determination and therapy of an expansive assortment of constant sicknesses, as well as in the counteraction and the board of such circumstances. These calculations might help with ending the spread of ailment, improving the proficiency with which clinical analyses are made, and diminishing the monetary weight put on patients as well as authoritative staff. This paper examines the technique of profound realizing, which is utilized in an assortment of medical care disciplines, in addition to analyzing the Elliptic Curve Cryptography solution to the healthcare data security problem. Following the completion of the summaries of the data obtained from each category, comparison tables are prepared employing the essential criteria. The frameworks for DL make use of a broad array of applications, tools, techniques, and data sets. DL stands for deep learning. In order to bring this whole thing to a close, we will talk about the opportunities and challenges that lie ahead for further research into profound learning models.
暂无评论