Network intrusion detection using machine learning, deep learning-a review

VR Varanasi, S Razia - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
An Intrusion Detection System (IDS) is an essential feature, aims to defend the integrity,
availability, the confidentiality of the data utilized in the networks against attacks. An IDS …

EMG controlled bionic robotic arm using artificial intelligence and machine learning

KS Sree, T Bikku, S Mounika… - … conference on I …, 2021 - ieeexplore.ieee.org
Electromyography is a one of a kind methodology for recording and breaking down the
electrical action created by muscles, and a Myo-electric controlled prosthetic appendage is …

Detection System for the Network Data Security with a profound Deep learning approach

NR Sai, GSC Kumar, MA Safali… - 2021 6th international …, 2021 - ieeexplore.ieee.org
It was picked to set up an interconnection approach that grants sharing the relationship of
information correspondence without the mediation of an individual. The Internet of Things …

Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare

GSC Kumar, D Prasad, VS Rao… - 2021 Third International …, 2021 - ieeexplore.ieee.org
The emergence of distributed computing with adaptability, improved access to information
and cost savings makes this innovation available and rapidly developing. Due to the rise in …

Usage of Saliency Prior Maps for Detection of Salient Object Features

VS Rao, V Mounika, NR Sai… - … on I-SMAC (IoT in Social …, 2021 - ieeexplore.ieee.org
Current headway on significant article identification is broad, progressing for the most part
from the unstable extension of Convolutional Neural Networks (CNNs). In Computer Vision …

Optimized conversion of categorical and numerical features in machine learning models

KS Sree, J Karthik, C Niharika… - … Conference on I …, 2021 - ieeexplore.ieee.org
While some data have an explicit, numerical form, many other data, such as gender or
nationality, do not typically use numbers and are referred to as categorical data. Thus …

Cnn implementation for ids

VR Varanasi, S Razia - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
Real world data is more complex in nature and requires proper handling to use with
machine learning techniques. Handling large volumes of data is the key aspect in deep …

Using DWT-DCT-SVD watermarking for securing medical images

MJ Kumar, NR Sai, RVK Reddy… - … conference on smart …, 2021 - ieeexplore.ieee.org
Telemedicine is an advanced digital application in which a huge volume of clinical
information must be transmitted safely and productively throughout the business. The …

Interest flooding attack detection method in NDN networks

V Mounika, NR Sai, V Bhavani… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
To viably identify interest flooding assault (IFA) in Named Data Networking (NDN), this paper
proposes a discovery technique for interest flooding assault dependent on chi-square test …

Development of Self-discovery and Exploration (SDE) Integrated Low Level Organism Taxonomy Teaching Materials to Improve Students' Critical Thinking Skills

A Hasairin, UNAD Jayanti, A Hartono… - … 2022 (ICOPE 2022), 2023 - atlantis-press.com
This research aims to improve students' critical thinking skills through the development of
self-discovery and exploration (SDE) teaching materials for low-level taxonomy of …