In today's society, because of the increase in the frequency of people's use of electronic products, it leads to the phenomenon of irregular writing of Chinese characters and forgetting the characters when put...
详细信息
ISBN:
(纸本)9798350375084;9798350375077
In today's society, because of the increase in the frequency of people's use of electronic products, it leads to the phenomenon of irregular writing of Chinese characters and forgetting the characters when putting pen to paper, thus affecting the inheritance of the excellent traditional Chinese culture to a certain extent, so this paper proposes a handwritten Chinese character writing specification evaluation system based on deep learning. This system adopts two deep learning multi-classification models based on ViT to reason about the handwritten Chinese character images in order to obtain the calligraphic evaluation factors, and then calculate the overall evaluation of this handwritten Chinese character through the AHP mathematical evaluation model, and at the same time generate comments for the user through the individual evaluation values.
In the fast-paced e-commerce environment, understanding and learning consumer perceptions of products is essential for businesses to enhance user experience, optimize marketing strategies, and better overall customer ...
详细信息
As cloud computing becomes more popular and cyber threats become more sophisticated, ensuring the security of cloud networks has become a paramount concern for organizations worldwide. In this dynamic environment, tra...
详细信息
ISBN:
(纸本)9798350359688
As cloud computing becomes more popular and cyber threats become more sophisticated, ensuring the security of cloud networks has become a paramount concern for organizations worldwide. In this dynamic environment, traditional security measures are frequently insufficient, necessitating the deployment of new technologies such as machinelearning-based anomaly detection systems. In the context of enhancing cloud network security, the goal of this survey research is to provide a comprehensive overview of the current state of machinelearning-based anomaly detection systems. The article begins by discussing the challenges and threats that cloud networks face, highlighting the need for proactive security measures. It then delves into the various machinelearning techniques and algorithms that have been employed for anomaly detection in cloud environments, covering methods for semi-supervised, supervised, and unsupervised learning. The advantages and limitations of each approach are analyzed, providing valuable insights into their practical implementation. This paper also explores practical application scenarios for anomaly detection systems in cloud networks that are based on machinelearning, illustrating their effectiveness in identifying and mitigating security threats. It also discusses the key factors that influence the performance of these systems, such as data quality, feature engineering, and model selection. The survey article also covers the challenges and open research questions in the field, emphasizing the need for continuous innovation and adaptation in the face of evolving threats. The paper concludes with a set of best practices and recommendations for organizations looking to optimize their cloud network security through the implementation of machinelearning-based anomaly detection systems. For security experts, researchers, and decision-makers looking to use machinelearning approaches to improve the security of their cloud networks, the survey offers
In the age of digital technology, the exponential spread of fake news has become a significant issue for society. In response to this issue, considerable advances have been made to identify fake news using machine lea...
详细信息
ISBN:
(纸本)9798350361513;9798350372304
In the age of digital technology, the exponential spread of fake news has become a significant issue for society. In response to this issue, considerable advances have been made to identify fake news using machinelearning (ML) models. This literature review investigates the current state of research on detecting fake news. It emphasizes the use of ML models such as TF-LIP, Naive Bayes, and Random Forest, as well as deep learning (DL) models such as Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, and Transformer-based models such as BERT. The review concisely summarizes the essential findings and discusses the potential future implications offake news identification. It also emphasizes the need for additional research to address numerous challenges, such as effective multimedia content management, protection against adversarial attacks, attainment of model generalizability, facilitation of real-time detection, and adherence to ethical standards when developing detection systems. This review is a resource for researchers and practitioners seeking to develop effective methods for addressing the perpetually expanding problem of detecting fake news.
It is possible for hard jobs to be done by machines with the help of machinelearning. Computers and cell phones could make it simpler to regulate the temperature inside a smart grid (a SG), keep an eye on security, a...
详细信息
The adoption of machine-learning-enabled systems in the healthcare domain is on the rise. While the use of ML in healthcare has several benefits, it also expands the threat surface of medical systems. We show that the...
详细信息
ISBN:
(纸本)9798350345025;9798350345018
The adoption of machine-learning-enabled systems in the healthcare domain is on the rise. While the use of ML in healthcare has several benefits, it also expands the threat surface of medical systems. We show that the use of ML in medical systems, particularly connected systems that involve interfacing the ML engine with multiple peripheral devices, has security risks that might cause life-threatening damage to a patient's health in case of adversarial interventions. These new risks arise due to security vulnerabilities in the peripheral devices and communication channels. We present a case study where we demonstrate an attack on an ML-enabled blood glucose monitoring system by introducing adversarial data points during inference. We show that an adversary can achieve this by exploiting a known vulnerability in the Bluetooth communication channel connecting the glucose meter with the ML-enabled app. We further show that state-of-the-art risk assessment techniques are not adequate for identifying and assessing these new risks. Our study highlights the need for novel risk analysis methods for analyzing the security of AI-enabled connected health devices.
In today's world, many technologically innovative solutions are developed to prioritize women's safety solutions, especially during nighttime. This research's main aim is to focus on addressing crucial saf...
详细信息
The world around us is becoming increasingly mechanized because of technology. Due to their energy efficiency and reduced need for tiresome human labor, automatic systems are preferred over manual ones. Automation of ...
详细信息
Mortality risk prediction of ICU patients is a valuable and challenging task due to limited clinical data. Accurate mortality risk prediction can improve the utilization of resources. In this work, we explore the use ...
详细信息
The present prevalence of online platforms and the internet has seen a substantial increase in the utilization of Generation Z slang, abbreviated expressions, and short words. These Lexical subtleties have become a vi...
详细信息
暂无评论