Underwater data transmission forms a feasible method for underwater communication. However, laboratory experiments significantly differ from natural aquatic settings due to physical size constraints. During the last f...
详细信息
Cryptographic hash functions are fundamental to secure digital interactions. This paper surveys one-way hashing, covering theoretical foundations, historical developments, cryptanalytic challenges, and widely trusted ...
详细信息
Pharmacological datasets like Yeast and Escherichia coli (E. coli) have a massive impact on the healthcare industry for the production of human drugs. Yeast is well recognized as a significant constituent in the produ...
详细信息
Ransomware attacks threaten organizations by encrypting files or locking systems and keeping them inaccessible unless a ransom is paid. Early detection of ransomware attacks helps organizations avoid financial losses,...
详细信息
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image *** has also driven research on image forgery detection ***...
详细信息
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image *** has also driven research on image forgery detection *** this paper,a U-Net with multiple sensory field feature extraction(MSCU-Net)for image forgery detection is *** proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or ***-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the features of different perceptual fields use residual propagation and residual feedback to recall the input feature information and consolidate the input feature information to make the difference in image attributes between the untampered and tampered regions more obvious,and introduce the channel coordinate confusion attention mechanism(CCCA)in skip-connection to further improve the segmentation accuracy of the *** this paper,extensive experiments are conducted on various mainstream datasets,and the results verify the effectiveness of the proposed method,which outperforms the state-of-the-art image forgery detection methods.
In the contemporary digital landscape, online reviews play a pivotal role in shaping tourists’ decisions, leveraging the pervasive influence of the internet. However, discerning the authenticity of reviews has become...
详细信息
The potential for wireless power transfer (WPT) technologies to transform the charging capabilities of a wide range of applications, from consumer electronics to medical devices has attracted a lot of attention. But u...
详细信息
Towards Video Anomaly Detection (VAD), existing methods require labor-intensive data collection and model retraining, making them costly and domain-specific. The proposed method, termed as Multi-modal Caption Aware Ne...
详细信息
Several intriguing research works on soft computing techniques have recently been presented and for the creation of a pulmonary TB diagnosis system, researchers continue to build an accurate and trustworthy intelligen...
详细信息
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi...
详细信息
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and *** of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’*** goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO *** projects belong to OSMO vendors,having offices in developing countries while providing services to developed *** the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed *** proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden *** results express that the suggested model has gained a notable recognition rate in comparison to any previous *** current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment.
暂无评论