Crop yield prediction has gained major potential for global food production. Predicting crop yields based on specific parameters like soil, environment, crop, and water has been an interesting research topic in recent...
详细信息
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
Histopathological images serve as pivotal assets within the domain of breast cancer diagnosis, demanding profound comprehension for precise interpretation. This paper introduces a histopathological image classificatio...
详细信息
With the rapid increase in Electric Vehicles (EVs), the issue of charging them has received a lot of attention. Since one EV’s charging time cannot be cut quickly and the number of charging stations will not expand q...
详细信息
Skin is a most essential and extraordinary part of the human structure. Exposure to chemicals such as nitrates, sunlight, arsenic, and UV rays due to pollution and depletion of the ozone layer is causing various skin ...
详细信息
In this paper, the notion of a soft topological transformation group is defined and studied. For a soft topological transformation group, it is proven that a map from a soft topological space onto itself is soft homeo...
详细信息
Sentiment analysis has been widely used in various fields of social media, education, and business. Specifically, in the education domain, the usage of sentiment analysis is difficult due to the huge amount of informa...
详细信息
This paper proposes a novel approach to address the dead neuron and stability-plasticity dilemma in deep neuro-fuzzy systems. The proposed solution is a neuro-fuzzy network with Long-short term memory (LSTM) based Art...
详细信息
This paper explores fundamental aspects of irresolute maps and investigates separation axioms, specifically semi-T2 and semi normal properties. The study introduces Irr-topological transformation groups, Irr*-topologi...
详细信息
暂无评论