The purpose of this study is to improve the performance of Support Vector Machine (SVM) algorithm in sentiment analysis of trainee reviews through parameter optimization using Grid Search. Trainee reviews were taken f...
详细信息
In ultra wideband (UWB) based localization and ranging systems, the main error source of ranging is the multi path effect on the timestamping process. However, in the literature it is widely assumed that the receive t...
详细信息
The present study introduces a novel approach to identifying the maturity of cacao fruits, utilizing YOLOv5s in tandem with the Convolutional Block Attention Module (CBAM). The efficacy of this method was evaluated on...
详细信息
In modern society, object detection tasks have become extremely important due to their numerous applications in fields such as autonomous driving, surveillance, and healthcare. Real-time detection is particularly cruc...
详细信息
The reliability of the electrical system is one of the most important aspects in ensuring the distribution of electrical power supply, especially in remote and isolated areas. With the increase in customer loads each ...
详细信息
Cyberbullied communications should be bundled since online harassment is growing and has serious implications. High cyberbullying requires strong text classification algorithms to safeguard persons and communities. Th...
详细信息
Digital twin is a technology that supports the implementation of digital transformation. The digital twin was developed to support decision making in various sectors. The digital twin concept is almost 20 years old an...
详细信息
Dengue shock syndrome (DSS) is an infectious disease that affects millions of people every year all over the world. Early detection of DSS is essential for providing effective therapy and promoting patient recovery. I...
详细信息
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of...
详细信息
ISBN:
(纸本)9789819776023
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of different services to customers, and that have the potential to do so. Customers are required to pay for the cost of using the Services in accordance with the company's "pay-for-use only" policy. However, there are certain firms, such as Google Inc, that provide customers with particular free storage space even though the services provided by the company are limited, specifically with regard to the public cloud. A third-party service provider frequently owns and maintains the infrastructure required to run cloud computing services. But because more and more data and files pertaining to individuals and businesses are being stored in the cloud, worries have started to grow about how safe it actually is. Among these are the protection of software for virtualization and distributed computing, the safety of application software, the administration of identities, and the authentication and restriction of access. Nevertheless, efficient user authentication is the most essential need of cloud computing, as it limits unauthorized usage of a cloud server. Cloud computing has become increasingly popular in recent years. In this research, we present a new authentication method between users and online computing systems that is based on the suggested secure hash algorithm (SHA-3) and makes use of the lightweight Sosemanuk method. We created this technique. That system is going to be known as the SoSha3 system. The design that has been proposed for the system deals with data in three different sizes: 128, 256, and 512 bits. In order to make these authentication systems suitable for cloud computing at high rates, some modifications were made to them. The three-dimensional chaotic system, also known as the Lorenz system, will be combined with the authentication architecture tha
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t...
详细信息
暂无评论