A survey of DDoS attacks using machine learning techniques

M Arshi, MD Nasreen, K Madhavi - E3S Web of Conferences, 2020 - e3s-conferences.org
The DDoS attacks are the most destructive attacks that interrupt the safe operation of
essential services delivered by the internet community's different organizations. DDOS …

A Novel Emotion based Music Recommendation System using CNN

VT Priyanka, YR Reddy, D Vajja… - … and Control Systems …, 2023 - ieeexplore.ieee.org
Music has a unique emotional connection with humans. It is a means of connecting
individuals from all over the world. On the other hand, it is a highly difficult task to generalize …

Mining images of high spatial resolution in agricultural environments

DVL Parameswari, CHM Rao, D Kalyani… - Applied …, 2023 - Springer
Satellites are widely used for remote sensing applications. High resolution images are used
for different geographical applications. Using geographical objects or spatial objects for …

A survey on hybrid machine translation

A Anugu, G Ramesh - E3S Web of Conferences, 2020 - e3s-conferences.org
Machine translation has gradually developed in past 1940's. It has gained more and more
attention because of effective and efficient nature. As it makes the translation automatically …

A survey on big five personality traits prediction using tensorflow

M Nilugonda, K Madhavi - E3S web of conferences, 2020 - e3s-conferences.org
A personality trait is a specific pattern of thought, thinking, or performing that manages to be
faithful over time and beyond essential places. The Big Five—Extraversion, Agreeableness …

Automated Voice-to-Image Generation Using Generative Adversarial Networks in Machine Learning

LP Yeluri, G Ramesh, Y Vijayalata… - E3S Web of …, 2023 - e3s-conferences.org
Creating visuals from words may appear to be a complex process, but it is achievable with
today's technological advancements in Information Systems. Naturally, all the human-centric …

[PDF][PDF] Using machine learning techniques to detect distributed denial of service attacks

MVK Jewani, PE Ajmire… - International Journal of …, 2021 - researchgate.net
Machine learning (ML) is used for network intrusion detection because it is predictable after
training with relevant data. ML provides a great way to detect new and unknown attacks …

Determining the Security Standards of Different Crypto Algorithms

P Surekha, P Nandini, S Shruthi… - … Computing and Data …, 2023 - ieeexplore.ieee.org
The protection of digital information has become increasingly important as technology
advances. Testing each cryptosystem individually can be time-consuming. To address this …