A novel deep learning technique for medical image analysis using improved optimizer
V Agarwal, MC Lohani, AS Bist - Health Informatics Journal, 2024 - journals.sagepub.com
Application of Convolutional neural network in spectrum of Medical image analysis are
providing benchmark outputs which converges the interest of many researchers to explore it …
providing benchmark outputs which converges the interest of many researchers to explore it …
Blockage of phishing attacks through machine learning classification techniques and fine tuning its accuracy
Blocking phishing attacks using machine learning classification techniques is a promising
approach to enhancing email security. Phishing attacks can involve the use of fictitious …
approach to enhancing email security. Phishing attacks can involve the use of fictitious …
Detection of phishing domain using logistic regression technique and feature extraction using bert classification model
Phishing attacks pose a severe danger to the security of cyberspace. Phishing is a sort of
fraud in which victims and businesses are deceived into clicking on malicious URLs and …
fraud in which victims and businesses are deceived into clicking on malicious URLs and …
Internet of Things (IOT) Intrusion Detection Utilizing CNN and Fine Tuning It Using Various Optimization Parameters
The Internet of Things (IOT) has experienced significant expansion in recent years, resulting
in the development of countless gadgets and systems aimed at improving everyday life. This …
in the development of countless gadgets and systems aimed at improving everyday life. This …
Phishing Site Detection Using Logistic Regression and Fine Tuning It Using Various Optimization Parameters
Cybercriminals frequently prefer to deceive people into compromising their own security
than using exploits or complex assaults to get access to networks. No matter what …
than using exploits or complex assaults to get access to networks. No matter what …
Detection of Malware Using Machine Learning techniques on Random Forest, Decision Tree, KNeighbour, AdaBoost, SGD, ExtraTrees and GaussianNB Classifier
Spotting harmful software with machine learning models has become more crucial in
cybersecurity. Machine learning can be used to recognize and sort harmful software by …
cybersecurity. Machine learning can be used to recognize and sort harmful software by …
Phishing URL Classification Using K-Nearest Neighbour and Logistic Regression Machine Learning Approaches
With rising Internet use across the develo** countries, increasing network security is vital
because it minimizes the dangers of social privacy spoofing, identity or information theft, and …
because it minimizes the dangers of social privacy spoofing, identity or information theft, and …
From Bean to Bar: Using CNNs for Automated White and Black Chocolate Variety Classification
Within the contemporary chocolate industry, the categorization and distinction of different
chocolate varieties—especially white and dark chocolate—are essential for evaluating …
chocolate varieties—especially white and dark chocolate—are essential for evaluating …
[PDF][PDF] Internet of Things (IOT) Intrusion Detection Utilizing CNN and Fine Tuning it using Various Optimization Parameters
The Internet of Things (IOT) has experienced significant expansion in recent years, resulting
in the development of countless gadgets and systems aimed at improving everyday life. This …
in the development of countless gadgets and systems aimed at improving everyday life. This …