[HTML][HTML] A novel machine-learning-based hybrid CNN model for tumor identification in medical image processing

G Dhiman, S Juneja, W Viriyasitavat, H Mohafez… - Sustainability, 2022 - mdpi.com
The popularization of electronic clinical medical records makes it possible to use automated
methods to extract high-value information from medical records quickly. As essential medical …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

[HTML][HTML] Appositeness of optimized and reliable machine learning for healthcare: a survey

S Swain, B Bhushan, G Dhiman… - Archives of Computational …, 2022 - Springer
Abstract Machine Learning (ML) has been categorized as a branch of Artificial Intelligence
(AI) under the Computer Science domain wherein programmable machines imitate human …

[HTML][HTML] Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks

OE Elejla, M Anbar, S Hamouda, S Faisal… - Applied Sciences, 2022 - mdpi.com
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …

Traffic anomaly detection in wireless sensor networks based on principal component analysis and deep convolution neural network

C Yao, Y Yang, K Yin, J Yang - IEEE Access, 2022 - ieeexplore.ieee.org
With the popularity of wireless networks, wireless sensor networks (WSNs) have advanced
rapidly, and their flexibility and ease of deployment have resulted in more security concerns …

Evaluation and analysis: Internet of things using machine learning algorithms for detection of ddos attacks

A Sharma, H Babbar - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) system is facing a large number of attacks nowadays. Distributed
Denial of Ser-vices (DDoS) attack is the most reported attack in the field of security …

Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

S Manickam, AHB AIghuraibawi… - Wireless …, 2022 - Wiley Online Library
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service
(DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many …

Segmentation and Classification of Encephalon Tumor by Applying Improved Fast and Robust FCM Algorithm with PSO‐Based ELM Technique

SK Mohapatra, P Sahu, J Almotiri… - Computational …, 2022 - Wiley Online Library
Nowadays, so many people are living in world. If so many people are living, then the
diseases are also increasing day by day due to adulterated and chemical content food. The …

Quantum Version of the k‐NN Classifier Based on a Quantum Sorting Algorithm

LF Quezada, GH Sun, SH Dong - Annalen der Physik, 2022 - Wiley Online Library
In this work a quantum sorting algorithm with adaptable requirements of memory and circuit
depth is introduced, and is used to develop a new quantum version of the classical machine …

A comparative study with linear regression and linear regression with fuzzy data for the same data set: LRFD

M Khan, R Kumar, G Dhiman - AI-enabled multiple-criteria decision …, 2022 - igi-global.com
Regression analysis is a quantitative research tool that is used to model and analyse
multiple variables in a dependent-independent relationship in order to create the most …