Regulating the Indian Securities Market-Securities and Exchange Board of India (SEBI) DOI
Aditya Kapoor

Опубликована: Янв. 1, 2024

Язык: Английский

Tiny machine learning empowers climbing inspection robots for real-time multiobject bolt-defect detection DOI
Tzu-Hsuan Lin, Chien-Ta Chang, Alan Putranto

и другие.

Engineering Applications of Artificial Intelligence, Год журнала: 2024, Номер 133, С. 108618 - 108618

Опубликована: Май 16, 2024

Язык: Английский

Процитировано

3

An Investigation of Various Techniques to Improve Cyber Security DOI
Shoaib Mohammad, Ramendra Singh, Rajiv Kumar

и другие.

Опубликована: Янв. 10, 2025

Cyber security threats, characterized by a series of assault stages, persistently aim to accomplish pre-established goal. Due the intricate nature these attacks, intruder is capable bypassing target's defenses and gaining access majority its systems. When accessing data kept in cloud, there genuine risk experiencing breaches, compromised credentials, Denial Service (DoS) assaults, hacked interfaces Application Programming Interfaces (APIs), permanent loss, other significant cybersecurity concerns. constant innovation cybercriminals, who continuously develop more advanced methods avoid detection, it challenging both identify prevent malicious activities. As digital technology advances, gigabytes terabytes are now generated every second. Businesses variety industries finding that using internet manage their resources transactions useful. Given value need safeguard privacy, securing big remains major challenge for all solutions. exponential expansion network data, intrusion detection becoming increasingly important, manual analysis would be either impossible or take same amount time as analyzing it. result, an urgent automated system extracting relevant information from enormous amounts hitherto untapped when comes detection. Data mining can perform tasks, such clustering, prediction, classification, extraction association rules between pieces. This paper discusses machine learning techniques designing systems networks. In this approach, NSL KDD set used input. First, CFS-correlation feature selection approach pick only features set. The collection contains 41 features. number characteristics was reduced 16 after applying CFS algorithm. attributes then classify predict malware

Язык: Английский

Процитировано

0

Implications, Opportunities, and Challenges of Blockchain in Natural Language Processing DOI Open Access
Neha Agrawal,

Balwinder Kaur Dhaliwal,

Sanjay Sharma

и другие.

Опубликована: Янв. 10, 2025

Blockchain technology is becoming a game-changer in sectors including healthcare, banking, and supply chain management. Its possible influence on Natural Language Processing (NLP) still mainly untapped, nevertheless. The goal of natural language processing (NLP), branch artificial intelligence, to make text resources comprehensible, interpreted, producible by computers. This article examines how blockchain might work together, emphasizing the advantages for enhancing data security, trust, transparency. NLP challenged unstructured data, which includes problems with quality origin verifiability. blockchain's decentralized unchangeable properties offer remedy fostering confidence guaranteeing authenticity textual materials. explores use copyright protection, plagiarism detection, content verification, its capacity verify material stop intellectual property theft. Furthermore, decentralized, cooperative annotation categorization are made easier combination processing, raises Caliber accessibility annotated datasets. But properly utilize potential this integration, issues scalability, privacy, transparency need be resolved. paper advances development secure, dependable, effective systems through thorough study body existing literature, case analysis, discussion challenges, suggestion future research areas.

Язык: Английский

Процитировано

0

Prioritization of Security Vulnerabilities under Cloud Infrastructure Using AHP DOI
Abhishek Sharma, Umesh Kumar Singh

Опубликована: Янв. 10, 2025

In an ideal world, cyber security and IT experts would aggressively find patch every possible vulnerability, ensuring that their enterprises be safe across all known attack vectors. Conventional vulnerability management solutions just aren't up to the task in this fast-paced world. Despite this, cybersecurity professionals are always under pressure keep business secure from avalanche of vulnerabilities. The CVSS system is used by most businesses prioritize control operations. It's a free, open-source methodology for determining severity CVSS, on other hand, fails as prioritizing metric because it lacks specificity discern between highest levels — how can anything "critical" if everything is? majority understand importance having priority strategy. absence any strategy, organizations will faced with overwhelming volume effort have make near-random decisions what mitigate first. Hence, vulnerabilities practically not feasible. So, there strong research scope framework or model which capable further helpful mitigation. objective here propose novel attributes matrix input proposed method. A approach introduced prioritization Cloud computing environments using Analytical Hierarchical Process (AHP).

Язык: Английский

Процитировано

0

A Review of Security Features in Prominent Cloud Service Providers DOI
Abhishek Mishra, Abhishek Sharma, Rajat Bhardwaj

и другие.

Опубликована: Янв. 10, 2025

Today, cloud storage has become an important part of the computing model because it provides resources that are cost-effective, flexible, and less likely to fail. On other hand, safeguarding issues in broader adoption industry face serious challenges. The diversity multitude places where data is stored further exacerbate these problems. main points discussed about protection are; availability, recognition, integrity, authenticity confidentiality. Encouraging more customers move will allow service providers deliver secure data. Electronic forensic software, encryption methods intrusion detection mechanisms some guarantees a reliable recovering collecting evidence activities. This article outlines issues, pitfalls, solutions associated with platforms. It also includes use major for protection.

Язык: Английский

Процитировано

0

Intelligent Pattern Discovery Using Web Data Mining DOI
Vidyapati Jha,

Chinnem Rama Mohan,

T. Sampath Kumar

и другие.

Опубликована: Янв. 10, 2025

Finding trends in people's internet activity and subsequently customizing their experiences is the aim of web usage mining. In online mining, functional information derived from data was employed. It gathers log records to comprehend how users interact with websites. There are several approachable research projects helpful resources available for certain purposes. The soon-to-be-collected can be used customization, structure enhancement, website modification, industrial intelligence characterization. A technique known as "web mining" collect real about they navigate Web also aims identify intriguing frequently occurring user access patterns browsing stored server logs, proxy or browser logs. Personalization, system improvements, corporate intelligence, advertising, design enhancement just a few numerous applications goal this find intelligent

Язык: Английский

Процитировано

0

Implementation of ResNet-50 on End-to-End Object Detection (DETR) on Objects DOI Creative Commons

Endang Suherman,

Ben Rahman, Djarot Hindarto

и другие.

SinkrOn, Год журнала: 2023, Номер 8(2), С. 1085 - 1096

Опубликована: Апрель 25, 2023

Object recognition in images is one of the problems that continues to be faced world computer vision. Various approaches have been developed address this problem, and end-to-end object detection relatively new approach. End-to-end involves using CNN Transformer architectures learn information directly from image can produce very good results detection. In research, we implemented ResNet-50 an End-to-End Detection system improve performance images. a architecture well-known for its effectiveness tasks, while DETR utilizes Transformers study representations We tested our on COCO dataset demonstrated + achieves better level accuracy than models do not use ResNet-50. addition, also show detect objects more quickly similar traditional models. The research by about 90%. systems speed, which huge advantage real-time applications. hope contribute development technology

Язык: Английский

Процитировано

8

LEN-YOLO: a lightweight remote sensing small aircraft object detection model for satellite on-orbit detection DOI
Jian Wu, Fanyu Zhao, Zhonghe Jin

и другие.

Journal of Real-Time Image Processing, Год журнала: 2024, Номер 22(1)

Опубликована: Дек. 19, 2024

Язык: Английский

Процитировано

2

Detects Damage Car Body using YOLO Deep Learning Algorithm DOI Creative Commons

Yonathan Wijaya Gustian,

Ben Rahman, Djarot Hindarto

и другие.

SinkrOn, Год журнала: 2023, Номер 8(2), С. 1153 - 1165

Опубликована: Май 2, 2023

This journal presents a technique for detecting scratches, cracks and other damage to car bodies using machine learning methods. method is used improve process efficiency checking accuracy can also reduce the cost time required manual inspection. The includes collecting image datasets of cars in good damaged condition, followed by preprocessing segmentation separate or parts. not broken. Then, it deep algorithm, namely You Only Look Once, Faster Region-based Convolutional Neural Networks, which build detection model. model trained tuned collected data, then evaluated test data measure precision results. experimental results show that proposed achieves high cracks, defects on body, with an average more than 70%. provides promising approach improving body inspection be taxi companies help inspect maintain vehicles quickly accurately, insurance, avoid accidents so on.

Язык: Английский

Процитировано

5

YOLO and Faster R-CNN Object Detection in Architecture, Engineering and Construction (AEC): Applications, Challenges, and Future Prospects DOI

Nitin Rane,

Saurabh Choudhary, Jayesh Rane

и другие.

SSRN Electronic Journal, Год журнала: 2023, Номер unknown

Опубликована: Янв. 1, 2023

Object detection plays a crucial role in transforming the Architecture, Engineering, and Construction (AEC) industry, enhancing project efficiency, safety, overall productivity. This study explores applications, challenges, future potential of two cutting-edge object algorithms, namely You Only Look Once (YOLO) Faster Region-based Convolutional Neural Networks (Faster R-CNN), within realm AEC. The research comprehensively investigates diverse applications YOLO R-CNN AEC, including real-time site monitoring, structural integrity assessment, safety protocol enforcement, automated progress tracking, quality control. These algorithms have propelled AEC industry forward, enabling advancements autonomous inspection, defect detection, resource management. Consequently, these innovations enhanced decision-making processes optimized lifecycles. Nevertheless, integrating technologies presents challenges. paper meticulously examines hurdles such as data annotation complexities, algorithmic limitations, computational demands. It also delves into ethical considerations, privacy, cybersecurity concerns, shedding light on implications associated with widespread adoption industry. Looking ahead, outlines prospects discusses solutions to existing include development more robust streamlined processes, edge computing. Moreover, emerging trends like Explainable AI (XAI) Generative Adversarial (GANs), envisioning their integration for even sophisticated provides valuable insights researchers, practitioners, policymakers, paving way efficient, innovative, ethically responsible sector.

Язык: Английский

Процитировано

5