This study aims to develop the supply management information system of department of computer and technology. The system associates with all parcel-related items in order to reduce the processing steps and increase th...
详细信息
This study aims to develop the supply management information system of department of computer and technology. The system associates with all parcel-related items in order to reduce the processing steps and increase th...
详细信息
This study aims to develop the supply management information system of department of computer and technology. The system associates with all parcel-related items in order to reduce the processing steps and increase the effectiveness of parcel management. To accomplish this study, the logical procedure has been utilized. We firstly survey and collect data, identify objectives and scopes of this study and finally develop the system. Next, the system improvement is done. Finally, we have the system's quality evaluated by experts. The result shows that the quality of system evaluated by experts is in the very good level with the score of 4.53 on average. The experts' satisfaction toward the system rated as excellence with the score of 4.32 on average. Thus this developed system can be used in practice with high quality rated.
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
This project aims to develop an information system to student care center of computer and Information technology, University of technology Thonburi. The procedure of development followed theory of System Development L...
详细信息
ISBN:
(纸本)9789604742738
This project aims to develop an information system to student care center of computer and Information technology, University of technology Thonburi. The procedure of development followed theory of System Development Life Cycle. The evaluation of the project are done by specialists in information systems development and the success of the project are assess by the users which rank by the satisfaction of an account.
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte...
详细信息
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shortest distances from the edge to all the other *** betweenness centrality ranks which edges are significant based on the fraction of all-pairs shortest paths that pass through the ***,extensive research efforts go into centrality computation over general graphs that omit time ***,numerous real-world networks are modeled as temporal graphs,where the nodes are related to each other at different time *** temporal property is important and should not be neglected because it guides the flow of information in the *** state of affairs motivates the paper’s study of edge centrality computation methods on temporal *** introduce the concepts of the label,and label dominance relation,and then propose multi-thread parallel labeling-based methods on OpenMP to efficiently compute edge closeness and betweenness centralities *** types of optimal temporal *** edge closeness centrality computation,a time segmentation strategy and two observations are presented to aggregate some related temporal edges for uniform *** edge betweenness centrality computation,to improve efficiency,temporal edge dependency formulas,a labeling-based forward-backward scanning strategy,and a compression-based optimization method are further proposed to iteratively accumulate centrality *** experiments using 13 real temporal graphs are conducted to provide detailed insights into the efficiency and effectiveness of the proposed *** with state-ofthe-art methods,labeling-based methods are capable of up to two orders of magnitude speedup.
Various content-sharing platforms and social media are developed in recent times so that it is highly possible to spread fake news and misinformation. This kind of news may cause chaos and panic among people. The auto...
详细信息
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl...
详细信息
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
Efficient botnet detection is of great security importance and has been the focus of researchers in recent years. Botnet detection is also a difficult task due to the difficulty in distinguishing it from normal traffi...
详细信息
暂无评论