This study explores modern fake news detection techniques in the Afan Oromo language, aiming to contribute to advancing research in this field. It explores deep learning methods for transformers, including Bidirection...
详细信息
In industrial domains with time and cost intensive manual or semi-automated inspection the demand for automation is high. Utilizing state of the art deep learning models for localization in vision-based domains such a...
详细信息
This research presents a methodology for trusting the provenance of data on the web. The implication is that data does not change after publication and the source of the data is stable. There are different data that s...
详细信息
Most of the existing face photo de-meshing methods have accomplished promising results;there are certain quality problems with these methods like the inpainted regions would appear blurry and unpleasant boundaries bec...
详细信息
Machine learning requires a large volume of sample data, especially when it is used in high-accuracy medical applications. However, patient records are one of the most sensitive private information that is not usually...
详细信息
Presents corrections to the paper, Corrections to “An Ensemble Hybrid Framework: A Comparative Analysis of Metaheuristic Algorithms for Ensemble Hybrid CNN Features for Plants Disease Classification”.
Presents corrections to the paper, Corrections to “An Ensemble Hybrid Framework: A Comparative Analysis of Metaheuristic Algorithms for Ensemble Hybrid CNN Features for Plants Disease Classification”.
Industrial automation systems (IAS) need to be highly dependable;they should not merely function as expected but also do so in a reliable, safe, and secure manner. Formal methods are mathematical techniques that can g...
详细信息
The Canadian wood industry use sawing simulators to digitally break a log into a basket of lumbers. However, those simulators tend to be computationally intensive. In some cases, this renders them impractical as decis...
详细信息
The Canadian wood industry use sawing simulators to digitally break a log into a basket of lumbers. However, those simulators tend to be computationally intensive. In some cases, this renders them impractical as decision support tools. Such a use case is the problem of dispatching large volume of wood to several sawmills in order to maximise total yield in dollars. Fast machine learning metamodels were recently proposed to address this issue. However, the approach needs a feature extraction step which could result in a loss of information. Conversely, it was proposed to directly make use of the raw information, available in the 3D scans of the logs typically used by a recent sawmill simulator, in order to retain that information. Here, we improve upon that method by reducing the computational cost incidental with the processing of those raw scans.
WordPress is the world’s most popular content management system. In recent years, websites using WordPress have been a popular target for hackers due to the platform’s popularity. To solve these problems, users turn...
WordPress is the world’s most popular content management system. In recent years, websites using WordPress have been a popular target for hackers due to the platform’s popularity. To solve these problems, users turn to security plugins to help them deal with security threats. However, there is no in-depth security analysis of the WordPress plugin system. In this regard, the paper aims to analyze the work of the main security plugins, including code analysis, testing with different types of threats, checking the data that they collect, and evaluating their strengths and weaknesses. The working principles and implementations of modern security plugins have been described and the criteria for selecting the studied plugins have been defined. The results have been summarized and the approaches used by the different plugins have been compared.
暂无评论