Network intrusion detection using machine learning, deep learning-a review
VR Varanasi, S Razia - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
An Intrusion Detection System (IDS) is an essential feature, aims to defend the integrity,
availability, the confidentiality of the data utilized in the networks against attacks. An IDS …
availability, the confidentiality of the data utilized in the networks against attacks. An IDS …
EMG controlled bionic robotic arm using artificial intelligence and machine learning
Electromyography is a one of a kind methodology for recording and breaking down the
electrical action created by muscles, and a Myo-electric controlled prosthetic appendage is …
electrical action created by muscles, and a Myo-electric controlled prosthetic appendage is …
Detection System for the Network Data Security with a profound Deep learning approach
It was picked to set up an interconnection approach that grants sharing the relationship of
information correspondence without the mediation of an individual. The Internet of Things …
information correspondence without the mediation of an individual. The Internet of Things …
Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare
The emergence of distributed computing with adaptability, improved access to information
and cost savings makes this innovation available and rapidly developing. Due to the rise in …
and cost savings makes this innovation available and rapidly developing. Due to the rise in …
Usage of Saliency Prior Maps for Detection of Salient Object Features
VS Rao, V Mounika, NR Sai… - … on I-SMAC (IoT in Social …, 2021 - ieeexplore.ieee.org
Current headway on significant article identification is broad, progressing for the most part
from the unstable extension of Convolutional Neural Networks (CNNs). In Computer Vision …
from the unstable extension of Convolutional Neural Networks (CNNs). In Computer Vision …
Optimized conversion of categorical and numerical features in machine learning models
KS Sree, J Karthik, C Niharika… - … Conference on I …, 2021 - ieeexplore.ieee.org
While some data have an explicit, numerical form, many other data, such as gender or
nationality, do not typically use numbers and are referred to as categorical data. Thus …
nationality, do not typically use numbers and are referred to as categorical data. Thus …
Cnn implementation for ids
VR Varanasi, S Razia - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
Real world data is more complex in nature and requires proper handling to use with
machine learning techniques. Handling large volumes of data is the key aspect in deep …
machine learning techniques. Handling large volumes of data is the key aspect in deep …
Using DWT-DCT-SVD watermarking for securing medical images
Telemedicine is an advanced digital application in which a huge volume of clinical
information must be transmitted safely and productively throughout the business. The …
information must be transmitted safely and productively throughout the business. The …
Interest flooding attack detection method in NDN networks
To viably identify interest flooding assault (IFA) in Named Data Networking (NDN), this paper
proposes a discovery technique for interest flooding assault dependent on chi-square test …
proposes a discovery technique for interest flooding assault dependent on chi-square test …
Development of Self-discovery and Exploration (SDE) Integrated Low Level Organism Taxonomy Teaching Materials to Improve Students' Critical Thinking Skills
This research aims to improve students' critical thinking skills through the development of
self-discovery and exploration (SDE) teaching materials for low-level taxonomy of …
self-discovery and exploration (SDE) teaching materials for low-level taxonomy of …