Every day,websites and personal archives create more and more *** size of these archives is *** comfort of use of these huge digital image gatherings donates to their ***,not all of these folders deliver relevant inde...
详细信息
Every day,websites and personal archives create more and more *** size of these archives is *** comfort of use of these huge digital image gatherings donates to their ***,not all of these folders deliver relevant indexing *** the outcomes,it is dif-ficult to discover data that the user can be absorbed ***,in order to determine the significance of the data,it is important to identify the contents in an informative *** annotation can be one of the greatest problematic domains in multimedia research and computer ***,in this paper,Adap-tive Convolutional Deep Learning Model(ACDLM)is developed for automatic image ***,the databases are collected from the open-source system which consists of some labelled images(for training phase)and some unlabeled images{Corel 5 K,MSRC v2}.After that,the images are sent to the pre-processing step such as colour space quantization and texture color class *** pre-processed images are sent to the segmentation approach for efficient labelling technique using J-image segmentation(JSEG).Thefinal step is an auto-matic annotation using ACDLM which is a combination of Convolutional Neural Network(CNN)and Honey Badger Algorithm(HBA).Based on the proposed classifier,the unlabeled images are *** proposed methodology is imple-mented in MATLAB and performance is evaluated by performance metrics such as accuracy,precision,recall and F1_*** the assistance of the pro-posed methodology,the unlabeled images are labelled.
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs...
详细信息
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b...
详细信息
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced by the existing system. This research concentrates on adopting a graphbasedfeature learning process to reduce feature dimensionality. The incoming samples arecorrectly classified and optimised using an Adaboost classifier with an improved grey wolfoptimiser (g-AGWO). The proposed IGWO optimisation approach is adopted to fulfil the multiconstraintissues related to bot detection and provide better local and global solutions (to satisfyexploration and exploitation). The extensive results show that the proposed g-AGWO model outperformsexisting approaches to reduce feature dimensionality, under-fitting/over-fitting andexecution time. The error rate prediction shows the feasibility of the given model to work over thechallenging environment. This model also works efficiently towards the unseen data to achievebetter generalization.
As an important computer vision task that can be used in many areas, facial expression recognition (FER) has been widely studied which much progress has been obtained especially when deep learning (DL) approaches have...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
Every day,more and more data is being produced by the Internet of Things(IoT)*** data differ in amount,diversity,veracity,and *** of latency,various types of data handling in cloud computing are not suitable for many ...
详细信息
Every day,more and more data is being produced by the Internet of Things(IoT)*** data differ in amount,diversity,veracity,and *** of latency,various types of data handling in cloud computing are not suitable for many time-sensitive *** users move from one site to another,mobility also adds to the *** placing computing close to IoT devices with mobility support,fog computing addresses these *** efficient Load Balancing Algorithm(LBA)improves user experience and Quality of Service(QoS).Classification of Request(CoR)based Resource Adaptive LBA is suggested in this *** technique clusters fog nodes using an efficient K-means clustering algorithm and then uses a Decision Tree approach to categorize the *** decision-making process for time-sensitive and delay-tolerable requests is facilitated by the classification of *** does the operation based on these *** MobFogSim simulation program is utilized to assess how well the algorithm with mobility features *** outcome demonstrates that the LBA algorithm’s performance enhances the total system performance,which was attained by(90.8%).Using LBA,several metrics may be examined,including Response Time(RT),delay(d),Energy Consumption(EC),and *** the on-demand provisioning of necessary resources to IoT users,our suggested LBA assures effective resource usage.
Video deblurring is a fundamental problem in low-level vision, and many methods have employed designs based on CNNs and transformers. Traditional CNNs often require deeper architectures to achieve a larger receptive f...
详细信息
Large Language Models (LLMs) have evolved into Multimodal Large Language Models (MLLMs), significantly enhancing their capabilities by integrating visual information and other types, thus aligning more closely with th...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many...
详细信息
Android devices are popularly available in the commercial market at different price levels for various levels of *** Android stack is more vulnerable compared to other platforms because of its open-source *** are many android malware detection techniques available to exploit the source code andfind associated components during execution *** obtain a better result we create a hybrid technique merging static and dynamic *** this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing *** the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given *** Android Sensitive Permission is one major key point to be considered while detecting *** select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or *** goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate.
During its growth stage,the plant is exposed to various *** and early detection of crop diseases is amajor challenge in the horticulture *** infections can harmtotal crop yield and reduce farmers’income if not identi...
详细信息
During its growth stage,the plant is exposed to various *** and early detection of crop diseases is amajor challenge in the horticulture *** infections can harmtotal crop yield and reduce farmers’income if not identified ***’s approved method involves a professional plant pathologist to diagnose the disease by visual inspection of the afflicted plant *** is an excellent use case for Community Assessment and Treatment Services(CATS)due to the lengthy manual disease diagnosis process and the accuracy of identification is directly proportional to the skills of *** alternative to conventional Machine Learning(ML)methods,which require manual identification of parameters for exact results,is to develop a prototype that can be classified without *** automatically diagnose tomato leaf disease,this research proposes a hybrid model using the Convolutional Auto-Encoders(CAE)network and the CNN-based deep learning architecture of *** date,none of the modern systems described in this paper have a combined model based on DenseNet,CAE,and ConvolutionalNeuralNetwork(CNN)todiagnose the ailments of tomato leaves *** trained on a dataset obtained from the Plant Village *** dataset consisted of 9920 tomato leaves,and the model-tomodel accuracy ratio was 98.35%.Unlike other approaches discussed in this paper,this hybrid strategy requires fewer training ***,the training time to classify plant diseases with the trained algorithm,as well as the training time to automatically detect the ailments of tomato leaves,is significantly reduced.
暂无评论