This paper presents the methodologies implemented for the Automatic Speech Recognition and Machine Translation for the language pairs Bhojpuri-Hindi and Marathi-Hindi for the Dialectal and Low-Resource shared task pro...
详细信息
The application of Agile methodologies to large-scale, safety-critical cyber-physical systems (LS/SC/CPS) has shown significant interest over the last 5 years. Although there has been limited research into each of the...
详细信息
Sign language is the communication medium that is utilized by the hearing-impaired community. The medium is visual and it uses hand signs and symbols for communication. Over 300 different types of sign languages prese...
详细信息
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approxim...
详细信息
ISBN:
(纸本)9791188428120
The ubiquity of the Internet plays a pivotal role in connecting individuals and facilitating easy access to various essential services. As of 2022, the International Telecommunication Union (ITU) reports that approximately 5.3 billion people are connected to the internet, underscoring its widespread coverage and indispensability in our daily lives. This expansive coverage enables a myriad of services, including communication, e-banking, e-commerce, online social security access, medical reporting, education, entertainment, weather information, traffic monitoring, online surveys, and more. However, this open platform also exposes vulnerabilities to malicious users who actively seek to exploit weaknesses in the virtual domain, aiming to gain credentials, financial benefits, or reveal critical information through the use of malware. This constant threat poses a serious challenge in safeguarding sensitive information in cyberspace. To address this challenge, we propose the use of ensemble and deep neural network (DNN) based machine learning (ML) techniques to detect malicious intent packets before they can infiltrate or compromise systems and applications. Attackers employ various tactics to evade existing security systems, such as antivirus or intrusion detection systems, necessitating a robust defense mechanism. Our approach involves implementing an ensemble, a collection of diverse classifiers capable of capturing different attack patterns and better generalizing from highly relevant features, thus enhancing protection against a variety of attacks compared to a single classifier. Given the highly unbalanced dataset, the ensemble classifier effectively addresses this condition, and oversampling is also employed to minimize bias toward the majority class. To prevent overfitting, we utilize Random Forest (RF) and the dropout technique in the DNN. Furthermore, we introduce a DNN to assess its ability to recognize complex attack patterns and variations compared to the ens
By examining patterns in the text data and metadata linked to job adverts, The use of learning algorithms has grown in popularity in the detection of fraudulent job postings. For this, Research Machine emphasises the ...
详细信息
The Self-Attention mechanism, which lies at the core of Transformer architectures, plays a vital role in capturing long-range dependencies. However, its high computational complexity and significant memory requirement...
详细信息
Phishing attacks remain a critical threat to cybersecurity, leveraging deception to steal sensitive information from individuals and organizations. Traditional detection methods often fail to keep up with evolving phi...
详细信息
Efficient traffic management in urban environments is essential for minimizing congestion and ensuring smooth transportation flow. 6G network is expected to offer faster data speeds, lower latency, and enhanced connec...
详细信息
Secure computing necessitates the integration in systems-on-Chips (SoCs) of strong Physical Unclonable Functions (PUFs) that can generate a vast amount of Challenge Response Pairs (CRPs) for cryptographic keys generat...
详细信息
With the increasing speed of advance of both Internet of Things (IoT) and the demands of utilizing IoT devices in different locations with high compatibility, fog computing has been foreseen as a sustainable solution....
详细信息
暂无评论