Shavi Bansal
YOU?
Author Swipe
View article: A Hybrid Deep Learning Framework for Intrusion Detection in Database Systems Using Brown-Bear Optimization and Tunicate Swarm Algorithm
A Hybrid Deep Learning Framework for Intrusion Detection in Database Systems Using Brown-Bear Optimization and Tunicate Swarm Algorithm Open
Protection of networks from changing cyberthreats depends critically on intrusion detection. This article presents a hybrid deep learning framework using a tunicate swarm algorithm and brown-bear optimization for intrusion detection. The T…
View article: Unified Transformer Framework for Automated Cyberbullying Detection
Unified Transformer Framework for Automated Cyberbullying Detection Open
Cyberbullying is a fast-growing public-health hazard, demanding reliable, real-time detection of abusive language online. This study presents a unified transformer framework that compares bidirectional encoder representations from transfor…
View article: Leveraging AI and Semantic Web Technologies for Enhanced Image Processing in Robotic Systems
Leveraging AI and Semantic Web Technologies for Enhanced Image Processing in Robotic Systems Open
Fall detection is an important task in the robotic system, and it is related to the well-being of the human subject. However, it is a challenging task to complete due to the presence of false positives and a lack of contextual awareness. I…
View article: Smart waste classification in IoT-enabled smart cities using VGG16 and Cat Swarm Optimized random forest
Smart waste classification in IoT-enabled smart cities using VGG16 and Cat Swarm Optimized random forest Open
Effective waste management is becoming a crucial component of sustainable urban development as smart technologies are used by smart cities more and more. Smart trash categorization systems provided by IoT may greatly enhance garbage sortin…
View article: Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection Open
The rise in mobile malware risks brought on by the explosion of Android smartphones required more efficient detection techniques. Inspired by a cascade of Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) networks, optimized usi…
View article: AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model
AI-Driven Malware Detection with VGG Feature Extraction and Artificial Rabbits Optimized Random Forest Model Open
View article: Semantic-Aware Hybrid Deep Learning Model for Brain Tumor Detection and Classification Using Adaptive Feature Extraction and Mask-RCNN
Semantic-Aware Hybrid Deep Learning Model for Brain Tumor Detection and Classification Using Adaptive Feature Extraction and Mask-RCNN Open
A brain tumor is one of the most prevalent causes of cancer death. The best strategy is the timely treatment of brain tumors in their early detection. Magnetic Resonance Imaging (MRI) is a standard non-invasive method to detect brain tumor…
View article: Ensemble deep learning and EfficientNet for accurate diagnosis of diabetic retinopathy
Ensemble deep learning and EfficientNet for accurate diagnosis of diabetic retinopathy Open
View article: Advance drought prediction through rainfall forecasting with hybrid deep learning model
Advance drought prediction through rainfall forecasting with hybrid deep learning model Open
Drought is a natural disaster that can affect a larger area over time. Damage caused by the drought can only be reduced through its accurate prediction. In this context, we proposed a hybrid stacked model for rainfall prediction, which is …
View article: Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models
Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models Open
Phishing detection in Semantic Web systems is crucial to safeguarding users from malicious attacks. In this context, this work presents a deep learning-based phishing attack detection model using MobileBERT for feature extraction and hyper…
View article: Optimized AI-Driven Semantic Web Approach for Enhancing Phishing Detection in E-Commerce Platforms
Optimized AI-Driven Semantic Web Approach for Enhancing Phishing Detection in E-Commerce Platforms Open
For e-commerce systems, phishing attempts remain a major threat, so sophisticated detection techniques using Semantic Web and artificial intelligence are very necessary. An efficient AI-driven Semantic Web method for phishing detection enh…
View article: Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models Open
In current scenario when economic and risk management sectors need accurate predictions of enterprise bankruptcy, it is very importance issue to research in the field of security of enterprise bankruptcy. In this context, we propose an hyb…
View article: Port-to-Port Expedition Security Monitoring System Based on a Geographic Information System
Port-to-Port Expedition Security Monitoring System Based on a Geographic Information System Open
Transportation companies operating both domestically and internationally are starting to worry about the safety of cargo freight. Utilizing a GIS-based port-to-port expedition safety monitoring system based on global information system is …
View article: Development of Enhanced Chimp Optimization Algorithm (OFCOA) in Cognitive Radio Networks for Energy Management and Resource Allocation
Development of Enhanced Chimp Optimization Algorithm (OFCOA) in Cognitive Radio Networks for Energy Management and Resource Allocation Open
Transmit time and power optimisation increase secondary network energy efficiency (EE). The optimum resource allocation strategy in cognitive radio networks is the enhanced chimp optimisation algorithm (OFCOA) since the EE maximising probl…
View article: A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks
A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks Open
View article: Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems
Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems Open
View article: Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks
Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks Open