Crop diseases have a significant impact on plant growth and can lead to reduced *** methods of disease detection rely on the expertise of plant protection experts,which can be subjective and dependent on individual ex...
详细信息
Crop diseases have a significant impact on plant growth and can lead to reduced *** methods of disease detection rely on the expertise of plant protection experts,which can be subjective and dependent on individual experience and *** address this,the use of digital image recognition technology and deep learning algorithms has emerged as a promising approach for automating plant disease *** this paper,we propose a novel approach that utilizes a convolutional neural network(CNN)model in conjunction with Inception v3 to identify plant leaf *** research focuses on developing a mobile application that leverages this mechanism to identify diseases in plants and provide recommendations for overcoming specific *** models were trained using a dataset consisting of 80,848 images representing 21 different plant leaves categorized into 60 distinct *** rigorous training and evaluation,the proposed system achieved an impressive accuracy rate of 99%.This mobile application serves as a convenient and valuable advisory tool,providing early detection and guidance in real agricultural *** significance of this research lies in its potential to revolutionize plant disease detection and management *** automating the identification process through deep learning algorithms,the proposed system eliminates the subjective nature of expert-based diagnosis and reduces dependence on individual *** integration of mobile technology further enhances accessibility and enables farmers and agricultural practitioners to swiftly and accurately identify diseases in their crops.
The present work comprises the measurement of activity concentrations of three radionuclides, 22⁶Ra, 228Ra, and 4⁰K in 33 species of vegetables commonly used in Koya district, the Iraqi Kurdistan region. The analysis ...
详细信息
The growing use of the Internet with its vulnerabilities has necessitated the adoption of Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect outsider infiltrations, unauthori...
详细信息
The growing use of the Internet with its vulnerabilities has necessitated the adoption of Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect outsider infiltrations, unauthorised accesses and malfunctions occurring in computer networks. Intrusions can be detected and reported to the network administrator by IDSs using various pieces of information such as port scanning and irregular traffic detection. Intrusion detection is a classification problem, and identifying effective features is an essential aspect of classification methods. Standard methods used for classification are neural networks, fuzzy logic, data mining techniques and metaheuristics. One of the novel metaheuristic algorithms introduced to address optimisation problems is the Horse herd Optimisation Algorithm (HOA). This paper introduces a new approach on the basis of HOA for network intrusion detection. The new method uses horse behaviours in the herd to select effective features to detect intrusions and interactions between features. For the purpose of the new approach, HOA is first updated into a discrete algorithm using the floor function. The binarised algorithm is then converted into a quantum-inspired optimiser by integrating the concepts of quantum computing with HOA to improve the social behaviours of the horses in the herd. In quantum computing, Q-bit and Q-gate aid in striking a greater balance between the exploration and exploitation processes. The resulting algorithm is then converted into a multi-objective algorithm, where the objectives can be chosen from a set of optimal solutions. The new algorithm, MQBHOA, is then used for intrusion detection in computer networks, which is a multi-objective optimisation problem. For the classification, the K-Nearest Neighbour (KNN) classifier is applied. To evaluate the new algorithm’s performance, two data sets, NSL-KDD (Network Security Laboratory—Knowledge Discovery and Data Mining) and CSE-CIC-IDS2018, are
Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Methods: However, access to a user's access legitimacy and impr...
详细信息
Medical image encryption is a mandatory process in various healthcare, Internet of Medical Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D chaotic map for the medical image en...
详细信息
The current work aims to present abundant families of the exact solutions of Mikhailov-Novikov-Wang equation via three different *** adopted methods are generalized Kudryashov method(GKM),exponential rational function...
详细信息
The current work aims to present abundant families of the exact solutions of Mikhailov-Novikov-Wang equation via three different *** adopted methods are generalized Kudryashov method(GKM),exponential rational function method(ERFM),and modified extended tanh-function method(METFM).Some plots of some presented new solutions are represented to exhibit wave *** results in this work are essential to understand the physical meaning and behavior of the investigated equation that sheds light on the importance of investigating various nonlinear wave phenomena in ocean engineering and *** equation provides new insights to understand the relationship between the integrability and water waves’phenomena.
Any plant's ability to grow disease-free is crucial for both the environment and human existence. Nevertheless, various diseases, viruses, and fungi affect the plant and highly influence the yield quality and prod...
详细信息
We present a novel timbre transfer model that uses an enhanced diffusion architecture to convert music from various instruments into Erhu timbre. The Erhu, a traditional Chinese instrument, is difficult to simulate du...
详细信息
Magnesium chips were coated with a high concentration of graphite using a binder and were used as the raw material for injection molding. The microstructure of the magnesium injection-molded product with added graphit...
详细信息
Broadband light detection and sensing are widely applied in modern *** a promising candidate for next-generation two-dimensional(2D)optoelectronic material,bismuth oxyselenide(Bi_(2)O_(2)Se)nanoplates exhibit many pro...
详细信息
Broadband light detection and sensing are widely applied in modern *** a promising candidate for next-generation two-dimensional(2D)optoelectronic material,bismuth oxyselenide(Bi_(2)O_(2)Se)nanoplates exhibit many prospects in the application of visible light detection due to their peculiar *** this work,we report the photodetection performance of single-crystal 2D Bi_(2)O_(2)Se nanoplates grown on SiO_(2)based on a ternary-alloy growth model by utilizing chemical vapor deposition(CVD).The Bi_(2)O_(2)Se nanoplates were found to have an even and uniform square shape with side lengths up to 15μm and an approximate thickness of 15 nm.A visible-light photodetector was fabricated based on a CVD-grown Bi_(2)O_(2)Se nanoplate,and characterized by a set of illumination experiments using a 400 nm laser at temperatures ranging from 77 to 370 *** device exhibited superior performance at the temperature of 77 K,with a responsivity of 523 A/W,a specific detectivity of 1.37×10^(11)Jones,a response time of 0.2175 ms,an external quantum efficiency of 162,119.44%,resulting in high-quality and fullcolor imaging in the visible *** results indicate that the single-crystalline Bi_(2)O_(2)Se nanoplates have excellent potential in broadband photodetection and non-cryogenic imaging.
暂无评论