Agriculture is the primary source of food, fuel, and raw materials and is vital to any country’s economy. Farmers, the backbone of agriculture, primarily rely on instinct to determine what crops to plant in any given...
详细信息
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively un...
详细信息
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively unless they are combined with additional algorithms that can alter the classifier’s parameters or select the optimal sub-set of features for the *** are used in tandem with classifiers to increase the stability and with efficiency of the classifiers in detecting *** algorithms,on the other hand,have a number of limitations,particularly when used to detect new types of *** this paper,the NSL KDD dataset and KDD Cup 99 is used to find the performance of the proposed classifier model and compared;These two IDS dataset is preprocessed,then Auto Cryptographic Denoising(ACD)adopted to remove noise in the feature of the IDS dataset;the classifier algorithms,K-Means and Neural network classifies the dataset with adam *** classifier is evaluated by measuring performance measures like f-measure,recall,precision,detection rate and *** neural network obtained the highest classifying accuracy as 91.12%with drop-out function that shows the efficiency of the classifier model with drop-out function for KDD Cup99 *** their power and limitations in the proposed methodology that could be used in future works in the IDS area.
With tremendous evolution in the internet world, the internet has become a household thing. Internet users use search engines or personal assistants to request information from the internet. Search results are greatly...
详细信息
The objective of style transfer is to maintain the content of an image while transferring the style of another ***,conventional methods face challenges in preserving facial features,especially in Korean portraits wher...
详细信息
The objective of style transfer is to maintain the content of an image while transferring the style of another ***,conventional methods face challenges in preserving facial features,especially in Korean portraits where elements like the“Gat”(a traditional Korean hat)are *** paper proposes a deep learning network designed to perform style transfer that includes the“Gat”while preserving the identity of the *** traditional style transfer techniques,the proposed method aims to preserve the texture,attire,and the“Gat”in the style image by employing image sharpening and face landmark,with the *** color,texture,and intensity were extracted differently based on the characteristics of each block and layer of the pre-trained VGG-16,and only the necessary elements during training were preserved using a facial landmark *** head area was presented using the eyebrow area to transfer the“Gat”.Furthermore,the identity of the face was retained,and style correlation was considered based on the Gram *** evaluate performance,we introduced a metric using PSNR and SSIM,with an emphasis on median values through new weightings for style transfer in Korean ***,we have conducted a survey that evaluated the content,style,and naturalness of the transferred results,and based on the assessment,we can confidently conclude that our method to maintain the integrity of content surpasses the previous *** approach,enriched by landmarks preservation and diverse loss functions,including those related to“Gat”,outperformed previous researches in facial identity preservation.
Generating financial reports from a piece of news is a challenging task due to the lack of sufficient background knowledge to effectively generate long financial reports. To address this issue, this article proposes a...
详细信息
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t...
详细信息
The vast volume of redundant and irrelevant network traffic data poses significant hurdles for intrusion detection. Effective feature selection is crucial for eliminating irrelevant information. Presently, most filter...
详细信息
Post Quantum Cryptography has received an increasing amount of active research. This has been made prominent by the ever-growing field of quantum computing which poses a formidable threat to the modern cybersecurity l...
详细信息
This systematic review gave special attention to diabetes and the advancements in food and nutrition needed to prevent or manage diabetes in all its forms. There are two main forms of diabetes mellitus: Type 1 (T1D) a...
详细信息
Fake news, Fake certification, and Plagiarism are the most common issues arising these days. During this COVID-19 situation, there are a lot of rumors and fake news spreading and some of us are using fake certificatio...
详细信息
暂无评论