This study analyzes the transformative potential of combining artificial intelligence (AI) with immersive technologies, specifically virtual reality (VR) and augmented reality (AR), to elevate educational outcomes sig...
详细信息
作者:
Lu, LinZou, Qingzhi
Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks
Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme...
详细信息
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing **...
详细信息
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing ***,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to ***,it is imperative to utilize sophisticated algorithms to address this *** learning is a highly effective approach for identifying and uncovering these harmful *** learning(ML)approaches can identify common characteristics in most phishing *** this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing *** that,we used the normalization technique on the dataset to transform the range of all the features into the same *** findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best *** in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction ***,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate.
This paper explores the importance of the electric eel foraging optimization (EEFO) algorithm in addressing feature selection (FS) problems, with the aim of ameliorating the practical benefit of FS in real-world appli...
详细信息
This paper explores the importance of the electric eel foraging optimization (EEFO) algorithm in addressing feature selection (FS) problems, with the aim of ameliorating the practical benefit of FS in real-world applications. The use of EEFO to solve FS problems props our goal of providing clean and useful datasets that provide robust effectiveness for use in classification and clustering tasks. High-dimensional feature selection problems (HFSPs) are more common nowadays yet intricate where they contain a large number of features. Hence, the vast number of features in them should be carefully selected in order to determine the optimal subset of features. As the basic EEFO algorithm experiences premature convergence, there is a need to enhance its global and local search capabilities when applied in the field of FS. In order to tackle such issues, a binary augmented EEFO (BAEEFO) algorithm was developed and proposed for HFSPs. The following strategies were integrated into the mathematical model of the original EEFO algorithm to create BAEEFO: (1) resting behavior with nonlinear coefficient;(2) weight coefficient and confidence effect in the hunting process;(3) spiral search strategy;and (4) Gaussian mutation and random perturbations when the algorithm update is stagnant. Experimental findings confirm the effectiveness of the proposed BAEEFO method on 23 HFSPs gathered from the UCI repository, recording up to a 10% accuracy increment over the basic BEEFO algorithm. In most test cases, BAEEFO outperformed its competitors in classification accuracy rates and outperformed BEEFO in 90% of the datasets used. Thereby, BAEEFO has demonstrated strong competitiveness in terms of fitness scores and classification accuracy. When compared to its competitors, BAEEFO produced superior reduction rates with the fewest number of features selected. The findings in this research underscore the critical need for FS to combat the curse of dimensionality concerns and find highly useful fea
Since its breakout, the coronavirus (covid-19) has wreaked devastation all over the world. There hasn't been a nation that hasn't been affected by it, and India is no exception. Finding a treatment for this si...
详细信息
The reliability of BiCGStab and IDR solvers for the exponential scheme discretization of the advection-diffusion-reaction equation is *** resulting discretization matrices have real *** consider BiCGStab,IDR(S),BiCGSt...
详细信息
The reliability of BiCGStab and IDR solvers for the exponential scheme discretization of the advection-diffusion-reaction equation is *** resulting discretization matrices have real *** consider BiCGStab,IDR(S),BiCGStab(L)and various modifications of BiCGStab,where S denotes the dimension of the shadow space and L the degree of the polynomial used in the polynomial *** implementations of BiCGStab exist which are equivalent in exact arithmetic,however,not in finite precision *** modifications of BiCGStab we consider are;choosing a random shadow vector,a reliable updating scheme,and storing the best intermediate *** is shown that the Local Minimal Residual algorithm,a method similar to the“minimize residual”step of BiCGStab,can be interpreted in terms of a time-dependent advection-diffusion-reaction equation with homogeneous Dirichlet boundary conditions for the residual,which plays a key role in the convergence *** to the real eigenvalues,the benefit of BiCGStab(L)compared to BiCGStab is shown to be modest in numerical ***-sparse(*** random)shadow residual turns out to be essential for the reliability of *** reliable updating scheme ensures the required tolerance is truly *** the best intermediate solution has no significant *** is to modify BiCGStab with a random shadow residual and the reliable updating scheme,especially in the regime of large P´eclet and small Damk¨ohler *** alternative option is IDR(S),which outperforms BiCGStab for problems with strong advection in terms of the number of matrix-vector *** MATLAB code used in the numerical experiments is available on GitLab:https://***/ChrisSchoutrop/krylov-adr,a C++implementation of IDR(S)is available in the Eigen linear algebra library:http://***.
Forecasting companies' stock market prices are one the interesting topics for analysts and researchers. Although a company's stock price can be unpredictable, long-term forecasts can help but it is dependent o...
详细信息
Chemical mechanical polishing plays a pivotal role in enhancing the topography of wafers during semiconductor fabrication. The hardness of polishing pads holds great significance as it determines the material removal ...
详细信息
Cherenkov radiation(CR)is available for a wide variety of terahertz(THz)radiation sources,but its efficiency is deeply affected by intrinsic *** find that if the tilted angle(α)of anisotropic material and radiation a...
详细信息
Cherenkov radiation(CR)is available for a wide variety of terahertz(THz)radiation sources,but its efficiency is deeply affected by intrinsic *** find that if the tilted angle(α)of anisotropic material and radiation angle(θ)meet the condition ofθ+α=π/2,the intensity of radiation fields for the charged particle bunch(CPB)moving from left to right cannot be influenced by intrinsic losses,which means long-distance radiation can be ***,we observe an asymmetric CR when the CPB moves from the opposite *** addition,we select natural van der Waals(vd W)materialα-MoO3as an example,further confirming that the radiation field can reach the far field and the asymmetric CR radiation can also be *** wonderful properties with long-distance radiation will extend the application of CR to a certain extent for future design and fabrication.
The advent of the COVID-19 pandemic has adversely affected the entire world and has put forth high demand for techniques that remotely manage crowd-related *** surveillance and crowd management using video analysis te...
详细信息
The advent of the COVID-19 pandemic has adversely affected the entire world and has put forth high demand for techniques that remotely manage crowd-related *** surveillance and crowd management using video analysis techniques have significantly impacted today’s research,and numerous applications have been developed in this *** research proposed an anomaly detection technique applied to Umrah videos in Kaaba during the COVID-19 pandemic through sparse crowd *** theKaaba rituals is crucial since the crowd gathers from around the world and requires proper analysis during these days of the *** Umrah videos are analyzed,and a system is devised that can track and monitor the crowd flow in *** crowd in these videos is sparse due to the pandemic,and we have developed a technique to track the maximum crowd flow and detect any object(person)moving in the direction unlikely of the major *** have detected abnormal movement by creating the histograms for the vertical and horizontal flows and applying thresholds to identify the non-majority *** algorithm aims to analyze the crowd through video surveillance and timely detect any abnormal activity tomaintain a smooth crowd flowinKaaba during the pandemic.
暂无评论