DON: Deep Optimized Network model based on Coot and Convoluted Recurrent learning algorithms for healthcare monitoring in IoMT systems

S Lakshmanaprakash, A Abirami, R Madanachitran… - Measurement, 2025 - Elsevier
The major challenges faced in the modern era involve fulfilling urgent needs for multi-access
health-tracking systems and reliable identification of diseases. Recent advancements in …

Optimization of Network Intrusion Detection Model Based on Big Data Analysis

J Shan, H Ma - Journal of Cyber Security and Mobility, 2024 - journals.riverpublishers.com
As user usage grows, so do security threats to networks, the Internet, websites, and
organizations. Detecting intrusions in such a big data situation is complex. A feature …

An Efficient Cluster Based Multi-Label Classification Model for Advanced Persistent Threat Attacks Detecting.

LP Byrapuneni, M Saidireddy - International Journal of …, 2024 - search.ebscohost.com
In response to escalating cyber threats, there is an urgent need for adaptive detection
mechanisms. This study introduces a cyber threat detection framework employing ensemble …

[PDF][PDF] Proactive Analysis and Detection of Cyber-attacks using Deep Learning Techniques

A Abirami… - Indian Journal …, 2024 - sciresol.s3.us-east-2.amazonaws …
Objectives: This study objective is to create a proactive forensic framework with a
classification model to identify the malicious content to avoid cyberattacks. Methods: In this …

Navigating the Landscape of Distributed Computing Frameworks for Machine and Deep Learning: Overcoming Challenges and Finding Solutions

M Ramasamy, M Elangovan - Scalable and Distributed Machine …, 2023 - igi-global.com
For a number of reasons, distributed computing is crucial to machine learning and deep
learning models. In the beginning, it makes it possible to train big models that won't fit in a …

FUOYE Journal of Engineering and Technology Journal/FUOYE Journal of Engineering and Technology/Vol. 8 No. 4 (2023)/Articles Open Access

AA Dandajeh, NI Abdullahi, A Ishaq, AO Ahmed - ajol.info
Nigeria is renowned for its vast production of paddy rice, resulting in a significant volume of
rice husk generation. Consequently, the conversion of these quantities of rice husk into …

[HTML][HTML] 2 Design of Network Intrusion Detection Model Based on Big Data Analysis Feature Optimization

J Shan, H Ma - journals.riverpublishers.com
Intrusion detection and defense systems are important guarantees for data security. The
related developers did not fully consider the security of the system when they first designed …

Cyber Attack Detection in A Global Network Using Machine Learning Approach

TO Odeyemi, CC Isiekwene, AP Abidoye - journal.engineering.fuoye.edu.ng
In this digital age, inter-device communication is key to seamless and smooth handshaking.
Communication can range from Internet of Things communication (IoT), autonomous …