NeuroProbe is a simple neural network simulator designed by authors specifically for educational purposes focusing on simulating inference phase on a computationally capable embedded hardware, aiming to provide a deep...
详细信息
Techniques that exploit spectral-spatial information have proven to be very effective in hyperspectral image classification. Joint sparse representation classification (JSRC) is one such technique which has been exten...
详细信息
Reducing a node’s power consumption is a difficult task for extending the network’s lifetime because the nodes are resource-constrained (i.e., limited battery power, processing capacity, storage, and non-rechargeabl...
详细信息
Emerging technologies of Agriculture 4.0 such as the Internet of Things (IoT), Cloud Computing, Artificial Intelligence (AI), and 5G network services are being rapidly deployed to address smart farming implementation-...
详细信息
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ...
详细信息
Machine learning has profoundly transformed various industries, notably revolutionizing the retail sector through diverse applications that significantly enhance operational efficiency and performance. This comprehens...
详细信息
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is har...
详细信息
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is hard to control because wind,rain,and insects carry *** researchers utilized a deep learning system to identify CBD in coffee cherries at three growth stages and classify photographs of infected and uninfected cherries with 93%accuracy using a random forest *** the dataset is too small and noisy,the algorithm may not learn data patterns and generate accurate *** overcome the existing challenge,early detection of Colletotrichum Kahawae disease in coffee cherries requires automated processes,prompt recognition,and accurate *** proposed methodology selects CBD image datasets through four different stages for training and *** to train a model on datasets of coffee berries,with each image labeled as healthy or *** themodel is trained,SHAP algorithmto figure out which features were essential formaking predictions with the proposed *** of these characteristics were the cherry’s colour,whether it had spots or other damage,and how big the Lesions *** inception is important for classification to virtualize the relationship between the colour of the berry is correlated with the presence of *** evaluate themodel’s performance andmitigate excess fitting,a 10-fold cross-validation approach is *** involves partitioning the dataset into ten subsets,training the model on each subset,and evaluating its *** comparison to other contemporary methodologies,the model put forth achieved an accuracy of 98.56%.
This paper proposes the Modified Light GBM to classify the Malicious Users (MUs) and legitimate Secondary Users (SUs) in the cognitive-radio network. The proposed method is to avoid the consequences of malicious users...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information *** enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover *** this paper,a novel encrypted communication scheme for image SWE is *** reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer *** employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be *** receiver can restore the secretmessage fromthe received image using only the list header position *** scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover *** boasts high concealment and security,along with a complete message restoration rate,making it resistant to ***,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of *** validate the proposed framework,practical tests and comparisons are conducted using multiple *** results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation...
详细信息
暂无评论