Diabetic retinopathy (DR) is a significant cause of adult blindness and a common consequence in diabetes patients, with the potential for irreversible vision loss as the condition advances. Manual diagnosis of DR by o...
详细信息
Creative Media courses often require students to iteratively gather peer playtesting feedback, respond to it, and document their reflections. To streamline this process, iReflect, a web application, was developed in o...
详细信息
Natural language processing is a rapidly evolving technology in an era of quick technological growth. Conventional rule-based methods are insufficient to meet the demands of today's complex challenges. One of the ...
详细信息
Watermarking technique refers to discreet embedding of an imprint to establish possession of the plagiarism. The current databases watermarking methods lack the ability to self-adapt to various kinds of information &a...
详细信息
Preserving privacy has become crucial in the field of location-based services (LBS) to leverage their full potential while protecting users from untrustworthy LBS providers. Given that LBS users typically use resource...
详细信息
Precise, low-power anemometry systems are vital for weather forecasting and wind energy harvesting. The most effective and efficient type of anemometer is the ultrasonic anemometer. This research develops an Arduino-b...
详细信息
The rapid development of computer networks, such as the internet, has caused a sea change in the ways in which people communicate and share information. The advent of widespread computer networks like the internet has...
详细信息
ISBN:
(纸本)9798331505745
The rapid development of computer networks, such as the internet, has caused a sea change in the ways in which people communicate and share information. The advent of widespread computer networks like the internet has caused a sea change in traditional modes of communication and information sharing. On the other hand, this technical progress has also opened the door for malicious actors to take advantage of loopholes and steal sensitive information, disrupt operations, etc. Therefore, intrusion detection systems (IDSs) are essential for screening harmful traffic and warding off frequent attacks. These algorithms used to work by comparing current attacks to those of the past or by following a predetermined set of rules. But now that data and computing power are more accessible than ever before, machine learning seems to be the way to go. In this study, to present DSAM-CGLSTM, a dual-staged attention mechanism based on conversion-gated Long Short Term Memory network, to capture both short-term mutation and long-term dependence info in the study dataset. To enhance the network's capacity to retrieve the short-term mutation information, hyperbolic tangent functions are incorporated into the input-gate and forget-gate of LSTM. Additionally, the network incorporates a dual-staged attention mechanism, which encompasses both input attention and temporal attention. Consequently, a novel algorithm for optimising the parameters of DSAM-CGLSTM, SSA, has been suggested in this research, which is based on metaheuristics. to use a single Jupyter notebook in the Google Colaboratory environment to conduct the entire experiment. to imported and then implemented the necessary software packages, including seaborn, pandas, matplotlib, keras, besides Tensor Flow, and to used the CICIDS 2017 dataset. During the model's training and validation processes, accuracy and loss were taken into account as performance indicators. With a 98.85% accuracy score, the deep learning model performed quit
This paper focuses on artificial intelligence in the game of Checkers and thus looks to further advance strategic decision-making within AI game agents. This is a problem arising in developing computationally efficien...
详细信息
Artificial Intelligence is rapidly advancing the medical field by providing innovative disease diagnosis, treatment, and research approaches. This study explores the application of artificial intelligence in breast ca...
详细信息
Image retrieval is the process of searching for similar images based on their visual content, which has significant applications in the field of medical imaging. Quickly retrieving similar images from a medical image ...
详细信息
暂无评论