Output list
Conference paper
Date presented 2024
International Conference on Information Technologies and Smart Systems
International Conference on Information Technologies and Smart Systems, 03/04/2024–04/04/2024, JP College of Engineering, Tamilnadu, India
he suggested answer, called Blockchain-Enhanced Safe HR Management (BESHRM), updates human resource management to the modern era by using blockchain technology to make data safer and more in line with rules. Here is a brief explanation of each of BESHRM's three main tactics. Blockchain Identity Protection (BIP), CSC, and Document Asset Management (DAM) are a few examples. Using secure hashing keeps BIP workers' names safe, and smart contracts make sure that CSC is following the rules of ethics. People who work for DAM use open tracking to make sure that the information they collect about human resources is correct. We are looking into the models and flowcharts that are used for the processes that are usually thought to be standard in the field of human resource management.
Conference paper
Date presented 2024
International Conference on Information Technologies and Smart Systems
International Conference on Information Technologies and Smart Systems, 03/04/2024–04/04/2024, JP College of Engineering, Tamilnadu, India
As breaches get smarter and more frequent, machine learning and cybersecurity are effective defenses. The beginning emphasizes the necessity for better cyberattack protections in today's IT environment. Modern dangers are so complex that trying new methods is crucial. Machine learning, known for its self-learning, is a formidable partner in this effort. It discusses the study's objectives and the importance of comparing the new and old methods. We discuss the dataset settings, assessment metrics, ablation experiments, and experimental setup used to evaluate the recommended technique in the methods section. Trustworthy and repeatable outcomes come from well-designed experiments. A variety of cyber threat scenarios are carefully assembled to provide educators with a thorough practice environment. The recommended approach has an accuracy score of 0.85, whereas standard methods average 0.72. The recommended approach has 0.78 memory, compared to 0.65 for existing methods. The proposed approach outperforms the best method, which has an F1 score of 0.68. The strategy works since the ROC AUC value is 0.92, substantially higher than 0.78 for standard methods. This evidence often reveals that the proposed technology performs better than others, reducing phony warnings and preventing internet threats.