Macro actions have been demonstrated to be beneficial for the learning processes of an agent and have encouraged a variety of techniques to be developed for constructing more effective ones. However, previous techniqu...
详细信息
Music recommendation systems are essential due to the vast amount of music available on streaming platforms,which can overwhelm users trying to find new tracks that match their *** systems analyze users’emotional res...
详细信息
Music recommendation systems are essential due to the vast amount of music available on streaming platforms,which can overwhelm users trying to find new tracks that match their *** systems analyze users’emotional responses,listening habits,and personal preferences to provide personalized suggestions.A significant challenge they face is the“cold start”problem,where new users have no past interactions to guide *** improve user experience,these systems aimto effectively recommendmusic even to such users by considering their listening behavior and music *** paper introduces a novel music recommendation system that combines order clustering and a convolutional neural network,utilizing user comments and rankings as ***,the system organizes users into clusters based on semantic similarity,followed by the utilization of their rating similarities as input for the convolutional neural *** network then predicts ratings for unreviewed music by ***,the system analyses user music listening behaviour and music *** popularity can help to address cold start users as ***,the proposed method recommends unreviewed music based on predicted high rankings and popularity,taking into account each user’s music listening *** proposed method combines predicted high rankings and popularity by first selecting popular unreviewedmusic that themodel predicts to have the highest ratings for each *** these,the most popular tracks are prioritized,defined by metrics such as frequency of listening across *** number of recommended tracks is aligned with each user’s typical listening *** experimental findings demonstrate that the new method outperformed other classification techniques and prior recommendation systems,yielding a mean absolute error(MAE)rate and rootmean square error(RMSE)rate of approximately 0.0017,a hit rate of 82.45%,an average normalized discounted cumulative gain
Malware is a‘malicious software program that performs multiple cyberattacks on the Internet,involving fraud,scams,nation-state cyberwar,and *** malicious software programs come under different classifications,namely ...
详细信息
Malware is a‘malicious software program that performs multiple cyberattacks on the Internet,involving fraud,scams,nation-state cyberwar,and *** malicious software programs come under different classifications,namely Trojans,viruses,spyware,worms,ransomware,Rootkit,botnet malware,*** is a kind of malware that holds the victim’s data hostage by encrypting the information on the user’s computer to make it inaccessible to users and only decrypting it;then,the user pays a ransom procedure of a sum of *** prevent detection,various forms of ransomware utilize more than one mechanism in their attack flow in conjunction with Machine Learning(ML)*** study focuses on designing a Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection(LBAAA-OMLMD)approach in computer *** presented LBAAA-OMLMDmodelmainly aims to detect and classify the existence of ransomware and goodware in the *** accomplish this,the LBAAA-OMLMD model initially derives a Learning-Based Artificial Algae Algorithm based Feature Selection(LBAAA-FS)model to reduce the curse of dimensionality ***,the Flower Pollination Algorithm(FPA)with Echo State Network(ESN)Classification model is *** FPA model helps to appropriately adjust the parameters related to the ESN model to accomplish enhanced classifier *** experimental validation of the LBAAA-OMLMD model is tested using a benchmark dataset,and the outcomes are inspected in distinct *** comprehensive comparative examination demonstrated the betterment of the LBAAAOMLMD model over recent algorithms.
The experiment was carried out by growing BaTiO3 (Undoped or Li-doped) on p-type Si(1 0 0) substrates using the Chemical Solution Deposition (CSD) method and spin coating at a rotational speed of 3000 rpm for 60 s, fo...
详细信息
Currently, online Shopping platforms have grown significantly, especially during the COVID-19 pandemic. This condition motivates the need for analyzing how the users/customers' opinions on using such platform. Sen...
详细信息
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks. Given the rise in cyber-attacks and the continuous emergence of ne...
详细信息
This research shows that social learning can be used to increase an organization's cybersecurity maturity level. Using a literature study and case study approach. Literature studies are used to identify social lea...
详细信息
Crisis management is preparing for and managing possible crises that may impact organizations and individuals at different levels. It involves effective communication, quick decision-making, and strategic planning to ...
详细信息
This paper proposes a recommendation model for similar programming problems to support programming education. In the proposed model, problem similarity is determined according to the similarity of source codes, in ter...
详细信息
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human ...
详细信息
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human behavior is especially crucial in applications such as assessing security conditions and preventing crowd *** paper investigates the capability of deep neural network(DNN)algorithms to achieve our carefully engineered pipeline for crowd *** includes three principal stages that cover crowd analysis ***,individual’s detection is represented using the You Only Look Once(YOLO)model for human detection and Kalman filter for multiple human tracking;Second,the density map and crowd counting of a certain location are generated using bounding boxes from a human detector;and Finally,in order to classify normal or abnormal crowds,individual activities are identified with pose *** proposed system successfully achieves designing an effective collective representation of the crowd given the individuals in addition to introducing a significant change of crowd in terms of activities *** results onMOT20 and SDHA datasets demonstrate that the proposed system is robust and *** framework achieves an improved performance of recognition and detection peoplewith a mean average precision of 99.0%,a real-time speed of 0.6ms non-maximumsuppression(NMS)per image for the SDHAdataset,and 95.3%mean average precision for MOT20 with 1.5ms NMS per image.
暂无评论