scispace - formally typeset
Journal ArticleDOI

Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry

Reads0
Chats0
TLDR
The aim of the researcher was to determine the effectiveness of artificial intelligence techniques against cyber security risks particularly in case of Iraq and the quantitative method of research design along with primary data was opted.
About
This article is published in Materials Today: Proceedings.The article was published on 2021-01-01. It has received 144 citations till now. The article focuses on the topics: Confirmatory factor analysis & Discriminant validity.

read more

Citations
More filters
Journal ArticleDOI

5G standards for the Industry 4.0 enabled communication systems using artificial intelligence: perspective of smart healthcare system

TL;DR: In this paper , the authors explore the current research problems using the 5G technology, and propose the novel architecture for smart healthcare systems using 5G and Industry 4.0 standards using the Network Simulator (NS2) to investigate the current 5G methods.
Journal ArticleDOI

The optimization efficient energy cooperative communication image transmission over WSN

TL;DR: In this article, the authors proposed energy efficiency and quality-aware multi-hop one-way cooperative image transmission framework based on image pre-processing technique, wavelet-based two-dimensional discrete wavelet transform (2D-DWT) methodology, and decode-and-forward (DF) algorithm at relay nodes.
Journal ArticleDOI

Smart city and cyber-security; technologies used, leading challenges and future recommendations

Chen Ma
- 03 Sep 2021 - 
TL;DR: In this paper, the authors present a survey and discus on explanation of cyber security, smart cities, and survey of available relevant literature on security in that technology, which focuses on the four main components of a smart city, i.e. smart grid, smart building, smart transportation system, and smart healthcare.
Journal ArticleDOI

Detection of human genetic variation in VAC14 gene by ARMA-PCR technique and relation with typhoid fever infection in patients with gallbladder diseases in Thi-Qar province/Iraq

TL;DR: Investigation VAC14 gene mutation in GD patients infected with Typhoid fever by gene polymorphism ARMS-PCR technique revealed that GD patientsinfected with typhoid fever that has about five times the risk of a gene VAC 14 mutation than the incidence of the same mutation inGD patients without typhoid Fever and the patient infected with typhoidal fever that contains cdtB gene have ten times the chance of being infected with a mutated gene.
Journal ArticleDOI

A review on security analysis of cyber physical systems using Machine learning

TL;DR: The research in this paper identifies the need for integrated security for CPS and throws light into different security challenges associated with CPS and the countermeasures that existed based on machine learning and deep learning techniques that come under Artificial Intelligence (AI) and data science.
References
More filters
Journal ArticleDOI

Discriminant Validity Assessment: Use of Fornell & Larcker criterion versus HTMT Criterion

TL;DR: In this paper, a new method has emerged for establishing the discriminant validity assessment through heterotrait-monotrait (HTMT) ratio of correlations method, which can detect the possible indiscriminant among the latent variables.
Journal ArticleDOI

Visual sensor intelligent module based image transmission in industrial manufacturing for monitoring and manipulation problems

TL;DR: Experimental results outwards show that the intelligent module provides energy-efficient, secured transmission with low computational time as well as a reduced bit error rate, which is a key requirement considering the intelligent manufacturing of VSNs.
Journal ArticleDOI

Manufacturing intelligent Corvus corone module for a secured two way image transmission under WSN

TL;DR: The Corvus corone module two-way image transmission is proposed that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Journal ArticleDOI

Engineering applications of neural networks

TL;DR: This paper describes several prototypical applications of neural network technology to engineering problems, representative of many of the engineering problems for which neural networks are applicable: adaptive control, feature recognition, and design.
Journal ArticleDOI

Boundary element analysis for elasticity problems using expanding element interpolation method

TL;DR: In this article, a boundary element analysis of two-dimensional linear elasticity problems by expanding element interpolation method is proposed, where the expanding element is made up based on a traditional discontinuous element by adding virtual nodes along the perimeter of the element.
Related Papers (5)