Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as *** study utilizes three distinct methodologies,Term Frequen...
详细信息
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as *** study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing *** study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron *** best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching *** study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems.
Oil spills represent a major environmental threat, particularly in marine ecosystems. Timely detection and segmentation of oil spills from satellite imagery is crucial for directing rapid response and remediation *** ...
详细信息
This study aims to assess the effectiveness of employing deep learning models for measuring retinal nerve fiber layer (RNFL) thickness in optical coherence tomography (OCT) scans of epilepsy patients. Conventional OCT...
详细信息
In addition to traditional approaches, several computerized techniques have been developed to enhance the results. The automation in the medical domain considerably reduced the burden and improved disease diagnosis, t...
详细信息
In order to meet the pressing demand for early diagnosis in healthcare, we proposed a unique hybrid architecture in this study that is intended for the categorization of gastrointestinal (GI) illnesses. With fewer tra...
详细信息
The exchange of information between road users makes it possible to improve the individual perception of traffic situations and thus increase safety in the traffic area. The transmission of safety-critical information...
详细信息
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management....
详细信息
Recent developments in the area of research on sign language recognition have led to making use of deep learning techniques with the goal to assist the self-learning transition of sign language from one language to an...
详细信息
Industrial safety is more important in both safety of human being and machines. To ensure this the temperature of the machine is monitored continuously and if any abnormal situation arises, the machine will be isolate...
详细信息
In this study, we introduce the pied kingfisher optimizer (PKO), a novel swarm-based meta-heuristic algorithm that draws inspiration from the distinctive hunting behavior and symbiotic relationships observed in pied k...
详细信息
In this study, we introduce the pied kingfisher optimizer (PKO), a novel swarm-based meta-heuristic algorithm that draws inspiration from the distinctive hunting behavior and symbiotic relationships observed in pied kingfishers in the natural world. The PKO algorithm is structured around three distinct phases: perching/hovering for prey (exploration/diversification), diving for prey (exploitation/intensification), and fostering symbiotic relations. These behavioral aspects are translated into mathematical models capable of effectively addressing a wide array of optimization challenges across diverse search spaces. The algorithm’s performance is rigorously evaluated across thirty-nine test functions, which encompass various unimodal, multimodal, composite, and hybrid ones. Additionally, eight real-world engineering optimization problems, including both constrained and unconstrained scenarios, are considered in the assessment. To gauge PKO’s efficacy, it is subjected to a comparative analysis against 3 categories of rival optimizers. The 1st category comprises well-established and widely-cited optimizers such as particle swarm optimization and genetic algorithm. The 2nd category encompasses recently published algorithms, including Harris Hawks optimization, Whale optimization algorithm, sine cosine algorithm, Grey Wolf optimizer, gravitational search algorithm, and moth-flame optimization. The 3rd category includes advanced algorithms, such as covariance matrix adaptation evolution strategy and Ensemble Sinusoidal Differential Covariance Matrix Adaptation with Euclidean Neighborhood (LSHADE-cnEpSin). The comparative analysis employs various performance metrics, including the Friedman mean rank and the Wilcoxon rank-sum test, to reveal PKO’s effectiveness and efficiency. The overall results highlight PKO’s exceptional ability to tackle intricate optimization problems characterized by challenging search spaces. PKO demonstrates superior exploration and exploitation tend
暂无评论