Zobrazeno 1 - 10
of 399
pro vyhledávání: '"Biju Issac"'
Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping
Publikováno v:
IEEE Access, Vol 12, Pp 57458-57477 (2024)
Class imbalance problems have received a lot of attention throughout the last few years. It poses considerable hurdles to conventional classifiers, especially when combined with overlapping instances, where the complexity of the classification task i
Externí odkaz:
https://doaj.org/article/6d7d070535124174a0db0612a0c56ab8
Publikováno v:
IEEE Access, Vol 11, Pp 56046-56065 (2023)
Social media has revolutionized the way individuals connect and share information globally. However, the rise of these platforms has led to the proliferation of cyber-hate, which is a significant concern that has garnered attention from researchers.
Externí odkaz:
https://doaj.org/article/a78785273d754c38a7bceb0780b33d81
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-18 (2022)
Abstract Due to the widespread usage of Android smartphones in the present era, Android malware has become a grave security concern. The research community relies on publicly available datasets to keep pace with evolving malware. However, a plethora
Externí odkaz:
https://doaj.org/article/8f8440d06b3e437894397b5ebf5257f9
Publikováno v:
Sensors, Vol 23, Iss 12, p 5562 (2023)
The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 3
Externí odkaz:
https://doaj.org/article/155ea680bb9d40bf815eff4921860ca9
Publikováno v:
IEEE Access, Vol 8, Pp 187914-187932 (2020)
Electronic mail has eased communication methods for many organisations as well as individuals. This method is exploited for fraudulent gain by spammers through sending unsolicited emails. This article aims to present a method for detection of spam em
Externí odkaz:
https://doaj.org/article/dc0d7b52084348a39280a855381b35d4
Autor:
Ranan G. Aktas, Michael Karski, Biju Issac, Liang Sun, Shira Rockowitz, Piotr Sliz, Khashayar Vakili
Publikováno v:
Cells, Vol 11, Iss 23, p 3797 (2022)
Organoids have been used to investigate the three-dimensional (3D) organization and function of their respective organs. These self-organizing 3D structures offer a distinct advantage over traditional two-dimensional (2D) culture techniques by creati
Externí odkaz:
https://doaj.org/article/ed70f046de8e472bbe2ed0eec99217ec
Publikováno v:
IEEE Access, Vol 7, Pp 52427-52439 (2019)
The security of resources in a corporate network is always important to the organization. For this reason, different techniques, such as firewall and intrusion detection systems, are important. Years of long research have resulted in the contribution
Externí odkaz:
https://doaj.org/article/b3a032d20a694a2d8cfa76c4e3d62fcb
Publikováno v:
Sensors; Volume 23; Issue 12; Pages: 5562
The number of users of the Internet has been continuously rising, with an estimated 5.1 billion users in 2023, which comprises around 64.7% of the total world population. This indicates the rise of more connected devices to the network. On average, 3
Publikováno v:
Journal of Computing and Information Technology, Vol 25, Iss 1, Pp 47-61 (2017)
This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as th
Externí odkaz:
https://doaj.org/article/ddfd00f305224796b7fe78c9e76c103c
Publikováno v:
2022 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA).