Comparative Evaluation of Machine Learning Models for Malicious URL Detection
Malicious URLs promoting threats like phishing and malware result in massive financial
losses worldwide. Automated identification of such URLs before users access them is crucial …
losses worldwide. Automated identification of such URLs before users access them is crucial …
Multi-class Investigation of Acute Lymphoblastic Leukemia using Optimized Deep Convolutional Neural Network on Blood Smear Images
M Dangore, SR Ashwini, AG Chendke… - 2024 MIT Art, Design …, 2024 - ieeexplore.ieee.org
Cancer of the bone marrow, often known as Acute Lymphoblastic Leukemia (ALL), is
characterized by the unchecked growth of lymphoid progenitor cells. It affects both children …
characterized by the unchecked growth of lymphoid progenitor cells. It affects both children …
Cyber security challenges in social meta-verse and mitigation techniques
Due to the unique architectural framework of the Social meta-verse, there's a potential for
various cyber threats to emerge. The cornerstone of privacy safeguarding within the Meta …
various cyber threats to emerge. The cornerstone of privacy safeguarding within the Meta …
Smart shop** trolley Using Arduino UNO
S Modi, M Modi, V Alone, A Mohite… - 2024 15th …, 2024 - ieeexplore.ieee.org
This paper presents a Smart Trolley with an Automatic Billing System using RFID technology
to enhance the retail shop** experience. The focus is on automating the checkout …
to enhance the retail shop** experience. The focus is on automating the checkout …
Machine Learning Approach for Human Brain Counselling
JD Palkar, CH Jain, KP Kashinath… - 2024 15th …, 2024 - ieeexplore.ieee.org
An innovative step in treating the mental health issues common to college students is the
PEACE web tool. With the use of cutting-edge machine learning (ML) algorithms, this …
PEACE web tool. With the use of cutting-edge machine learning (ML) algorithms, this …
Software-Defined-Storage Performance Testing Using Mininet
Customary capacity the board methods are turning out to be less powerful for dealing with
this huge volume of information because of the improvement of server farms and the …
this huge volume of information because of the improvement of server farms and the …
Comparison of machine learning models for identifying malicious URLs
MD Karajgar, S Sawardekar… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Malicious URLs, posing threats such as phishing and malware, cause significant financial
losses globally. Detecting these URLs automatically before users access them is essential …
losses globally. Detecting these URLs automatically before users access them is essential …
Analyzing acute lymphoblastic leukemia across multiple classes using an enhanced deep convolutional neural network on blood smear
Bone marrow cancer, commonly referred to as Acute Lymphoblastic Leukemia (ALL), is
marked by the rapid proliferation of immature lymphoid cells. This condition affects both …
marked by the rapid proliferation of immature lymphoid cells. This condition affects both …
Deep Fake Detection for Preventing Audio and Video Frauds Using Advanced Deep Learning Techniques
AO Vaidya, M Dangore, VK Borate… - 2024 IEEE Recent …, 2024 - ieeexplore.ieee.org
Deepfakes allow for the automated gen-eration of fake video content, often accomplished
through the use of generative adversarial networks. To address the increasing issue of …
through the use of generative adversarial networks. To address the increasing issue of …
Upgrading Energy Productivity in Urban City Through Neural Support Vector Machine Learning for Smart Grids
SP Patil, SY Zurange, AA Shinde… - 2024 15th …, 2024 - ieeexplore.ieee.org
Long haul maintainability is progressively significant for shrewd urban communities, and the
energy the executives in savvy urban communities assumes a key part in accomplishing the …
energy the executives in savvy urban communities assumes a key part in accomplishing the …