The advancement of technology has had an influence on every part of our lives, from banking to the way we connect with one another. Indeed, technology has become an essential component of sustaining civilization, and its incorporation into education is consequently unavoidable. Technology not only gives students access to a plethora of online materials, but it also helps them study. The majority of colleges and educational institutions have already begun to use technology into their teaching techniques. This paper provides in-depth on the effect and impact of the modern technology in the teaching and learning process through reviewing various secondary data. Education has been transformed by technological advancements. The significance of technology in classrooms cannot be overstated. Indeed, the introduction of computers into education has made it simpler for instructors to transfer information and for pupils to retrieve it. The integration of technology into education ecosystem has made the and learning processes more entertaining.
One of the most widely recognised cyber-assaults against web-based application weaknesses is the structured query language injection attack (SQLIA), which is utilised to execute unlawful information control language, evade confirmation strategies, and access confined information. Some published systematic reviews were considered in this area. Older and more current papers in the field are often included in more recent systematic reviews. As a result, all of the publications we looked at were recent. I used data from 2012 to 2020 for the present analysis. There are a few techniques and systems for identifying and forestalling SQLIA, including encryption, XML, design coordinating, parsing, and machine learning. Guarded coding is utilised to apply Machine Learning (ML) procedure, which has been shown to be significant for SQLIA alleviation. The machine learning approach needs a ton of information to prepare models really and support a few attack types. An extremely difficult visually impaired SQL injection attack might be relieved utilizing ML procedures. An exploratory examination of Logistic Regression (LRN), Stochastic Gradient Descent (SDG), Sequential Minimal Optimization (SMO), Bayes Network (BNK), Instance-Based Learner (IBK), Multilayer Perceptron (MLP), Naive Bayes (NBS), and J48 was completed in the Waikato Climate for Information Investigation. The presentation of the regulated learning grouping calculations was surveyed utilizing Wait (70%) and 10-crease Cross Validation appraisal methods to decide the best calculation. According to the findings of the Cross Validation approach, SMO, IBK, and J48 had accuracy values of 98.7785%, 98.4285%, and 98.2985%, respectively, while the Hold-Out technique revealed accuracy values of 98.7956%, 98.1526%, and 100 for SMO, IBK, and J48. In contrast, IBK and J48 needed 10.15 seconds, 0.06 seconds, and 14.12 seconds, respectively, to create their models using the Cross Validation approach SMO, whereas they needed 9.71 seconds, 0.16 seconds, and 14.28 seconds, respectively, to develop their models using the Hold-Out technique SMO. According to the results, IBK was selected as the classifier for SQLIA detection and prevention since it required the least amount of time to develop a model using the Cross Validation approach and performed better than other candidates in terms of accuracy, sensitivity, and specificity. For the best algorithm selection for predictive analytics, various performance assessment measures are also crucial in addition to accuracy.
Forum is a huge space where people from different geographical location can express and share their own opinions, influencing any aspect of life by marketing and communication. On one side, Monitoring suspicious communication on these forums is the best way to measure the loyalty of users. On the other side, Many malicious people use these discussion forums for illegal purpose by posting suspicious chats in the form of text, video or images, exchange them with other users. The law enforcement agencies are looking for solutions to monitor these communication forums for possible criminal activities. Mostly the data stored in chat forums are in the form of text, so the proposed system will focus only on text posts. Considering this scenario, I propose a system which tackle this problem. Monitoring the malicious activities is the best way to calculate the user's honesty, keeping a track of their sentiment toward their chats. The exponential advancement in information and communication technology has fostered the creation of new online forums for many online discussions and has also reduced a distance between people. In online forums the user produce various formats of malicious post like text, image, video, gif and exchange them online with other people.
Software cost estimation is the process of predicting the amount of effort required to build a software system. Models provides one or more mathematical algorithms that compute cost as a function of a number of variables, size is primary cost factor in most models and can be measuring using lines of code (LOC). The models should be used to estimate the cost of software, SLIM is a useful model to estimate the cost and it is a good model for big projects, also this model required some parameters to generate an estimation. Software cost estimation always characterized one of the biggest challenges in Computer Science for the last decades. Because time and cost estimate at the early stages of the software development are the most difficult to obtain, and they are often the least accurate. Traditional algorithmic techniques such as regression models, Software Life Cycle Management (SLIM), require an estimation process in a long term.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.