In the traditional form of instruction, the teacher and pupil converse face to face. The discussion is started by the instructor, who generally discusses the material from the required textbooks. Many students might n...
详细信息
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
Technological advancements have brought a new era of growth for the healthcare industry. Nowadays, the security of healthcare data and the preservation of user privacy inside smart healthcare systems are being severel...
详细信息
Modernization and intense industrialization have led to a substantial improvement in people’s quality of life. However, the aspiration for achieving an improved quality of life results in environmental contamination....
详细信息
Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. Lic...
详细信息
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to t...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being *** study presents a novel framework for generating animatable 3D cartoon faces from a single portrait *** First,we transferred an input real-world portrait to a stylized cartoon image using *** then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed *** two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark ***,we proposed a semantic-preserving face-rigging method based on manually created templates and deformation *** Compared with prior arts,the qualitative and quantitative results show that our method achieves better accuracy,aesthetics,and similarity ***,we demonstrated the capability of the proposed 3D model for real-time facial animation.
This study develops a cutting-edge framework for detecting phishing attacks, leveraging the synergy between natural language processing and advanced deep learning. It begins with a comprehensive dataset and advances t...
详细信息
Sign language serves as a vital mode of communication for the deaf and hard of hearing community, yet access to sign language content remains limited due to the lack of accurate and timely captioning. In this paper, a...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
暂无评论