A recommendation system plays a vital role in the social media world, and it is used in many applications which provide recommendations based on user preferences. A recommendation is nothing but a choice-making system...
详细信息
This paper presents PhishURLDetect: a lightweight security framework for detecting phishing URLs based on fine-tuned Large Language Models (LLMs). It utilizes a proprietary corpus comprising 573,880 phishing and benig...
详细信息
Marine debris has become a global problem, concerning all marine ecosystems, and humans alike. It's known to cause severe damage to the marine and coastal habitats, since a part of it washes up along the shores an...
详细信息
Agriculture is the backbone of the economic system for any country and for ages, agriculture has been related with the production of vital food crops to satisfy the needs of consumers. Farmers must meet the changing n...
详细信息
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,***,the sensor nodes of WSNs ar...
详细信息
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,***,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to *** recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and *** traditional models,the solution has been made for defending the networks,only to specific ***,in real-time applications,the kind of attack that is launched by the adversary is not ***,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be *** that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various ***,for efficient model design,the work includes the part of feature evaluation of some general attacks of *** IDRM also includes determination of optimal secure paths and Node security for secure routing *** performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN *** is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
In 2011,the Professor Gogotsi and Professor Barsum reported the use of MAX phase Ti_(3)AlC_(2)as a precursor to prepare two-dimensional structured Ti_(3)C_(2)T_(x)MXenes(Tx,various functional groups including O,F and ...
详细信息
In 2011,the Professor Gogotsi and Professor Barsum reported the use of MAX phase Ti_(3)AlC_(2)as a precursor to prepare two-dimensional structured Ti_(3)C_(2)T_(x)MXenes(Tx,various functional groups including O,F and OH,etc.),and applied them to lithium-ion batteries[1].In the past 12 years,researchers have developed a large family of MXenes by using hydrofluoric acid etching[1,2]and Lewis acidic molten salt[3,4]to match a large family of MAX.
A key goal of clustering is data reduction. In center-based clustering of complex objects therefore not only the number of clusters but also the complexity of the centers plays a crucial role. We propose LBudget Clust...
详细信息
Skin cancer segmentation is a critical task in a clinical decision support system for skin cancer *** suggested enhanced cuckoo search based optimization model will be used to evaluate several metrics in the skin canc...
详细信息
Skin cancer segmentation is a critical task in a clinical decision support system for skin cancer *** suggested enhanced cuckoo search based optimization model will be used to evaluate several metrics in the skin cancer pic-ture segmentation *** time and resources are always limited,the proposed enhanced cuckoo search optimization algorithm is one of the most effec-tive strategies for dealing with global optimization diffi*** of the most significant requirements is to design optimal solutions to optimize their *** is no particular technique that can answer all optimization *** proposed enhanced cuckoo search optimization method indicates a constructive precision for skin cancer over with all image segmentation in computerized *** accuracy of the proposed enhanced cuckoo search based optimization for melanoma has increased with a 23%to 29%improvement than other optimization *** total sensitivity and specificity attained in the proposed system are 99.56%and 99.73%*** proposed method outperforms by offering accuracy of 99.26%in comparisons to other conventional *** proposed enhanced optimization technique achieved 98.75%,98.96%for Dice and Jaccard coeffi*** model trained using the suggested measure outperforms those trained using the conventional method in the segmentation of skin cancer picture data.
Convolutional neural networks(CNNs) based object detection methods are prone to be interfered with by background noise and cannot make full use of semantic information in the positive sample-choosing phase. To overcom...
详细信息
This study explores the effectiveness of combining BERT (Bidirectional Encoder Representations from Transformers) with convolutional neural networks (CNN) and multilayer perceptrons (MLP) for a specific task. The resu...
详细信息
暂无评论