This research aims to build a mathematical model to formulate the problems of implementing knowledge management systems in companies that often face obstacles in achieving the desired objectives and goals. With increa...
详细信息
Predicting personality is a growing topic in the field of natural language processing. The study of personality prediction has been proven to benefit the development of recommender systems and automated personality as...
详细信息
The expansion of deep learning techniques, as well as the availability of large audio/sound datasets, have fueled tremendous breakthroughs in audio/sound classification during the last several years. The transfer lear...
详细信息
ISBN:
(数字)9798350364101
ISBN:
(纸本)9798350364118
The expansion of deep learning techniques, as well as the availability of large audio/sound datasets, have fueled tremendous breakthroughs in audio/sound classification during the last several years. The transfer learning approach has emerged as one of the primary approaches for improving the accuracy and durability of classification systems. This study conducts a comprehensive comparative analysis to determine the effectiveness and performance of this method in environment sound classification. This current investigation focuses on environmental sound classification using VGGish and YAMNet pre-trained models with the ESC-50 and BDLib2 datasets. In the ESC-50 dataset, VGGish improves accuracy to 372.22%, while YAMNet improves accuracy to 383.33% when compared to baseline models. Similarly, in the BDLib2 dataset, accuracy increases significantly to 221.43% with VGGish and 246.43% with YAMNet. Transfer learning exhibits remarkable effectiveness in enhancing model performance, with significant accuracy boosts observed in both datasets. YAMNet, designed specifically for sound classification tasks, surpasses VGGish in improving environmental sound classification performance, potentially due to its architecture’s adaptability and diverse training on environmental sounds.
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a me...
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a means to automate and disintermediate business processes, their security vulnerabilities can be critical. The main issue discussed in this paper is the lack of a holistic approach to risk management smart contracts. The resulting framework consists of six steps: Risk identification, assessment, prioritization, mitigation, testing, and continuous monitoring (and was developed through reviewing existing literature on smart contract security and the NIST RMF). It is recommended that a case study be performed to prove the proposed model's effectiveness in managing the risks of smart contracts and minimizing financial losses and reputational harm. The paper presents a risk management framework for smart contracts to increase trust and adoption to enhance security while reducing financial losses and reputation damage. This has wider implications for the security of smart contracts and can be used as a starting point for future work. This study is expected to significantly contribute to smart contract security by introducing an organized way to address these contracts' risks using the NIST RMF.
This study evaluates the performance of the REAL-ESRGAN [1] model on images with varying levels of degradation using the DIV2K dataset [2], such as the Wild, the Mild, the Difficult, and the x8 subsets. REAL-ESRGAN wa...
详细信息
ISBN:
(数字)9798350389654
ISBN:
(纸本)9798350389661
This study evaluates the performance of the REAL-ESRGAN [1] model on images with varying levels of degradation using the DIV2K dataset [2], such as the Wild, the Mild, the Difficult, and the x8 subsets. REAL-ESRGAN was created to solve super-resolution problems and aims to produce high-resolution images from low-resolution images. Experiments were conducted at scales of x2 and x4, and performance was measured using Full-Reference metrics (LPIPS, PSNR, SSIM) and No-Reference metrics (NIQE, MANIQA, CLIPIQA, and PI). The Results were good, especially with the x2 scale; it has higher PSNR and SSIM scores, lower LPIPS and NIQE values, and enhanced visual and perceptual quality. The model faced more significant challenges with the wild and the difficult datasets because they have more complex degradations and compression artifacts; it can be seen with unstable results of Full-Reference and No-Reference metrics. On the contrary, the Mild and x8 datasets yielded better results in both metrics; not only that, even the computational cost for Mild and x8 outperforms the rest of the dataset. This study shows the strengths and limitations of REAL-ESRGAN in handling different levels of image degradation. For future research, the model needs enhancement to tackle the degradation format of the wild and the difficult dataset. It would be good if the REAL-ESRGAN improvement could also maintain the computational cost.
In the world of education, learning management systems are currently widely used. The massively open online courses are accessible either via the web or mobile. The Learning Management System (LMS) is one of the learn...
详细信息
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their ability to withstand these malicious threats. This study examines the impact and importance of organizational security culture in ransomware threat mitigation. We have surveyed five organizations, giving points from 1 to 5 for each question on cultural factors, leadership support, employee awareness and involvement (compliance), communication, behavior change or BBS practice incorporation, learning/training delivery methodology, and Size and industry impact on their security culture. The results indicate that a robust security culture, with leadership and effective communication, builds stronger resilience to ransomware. Organizations with jointly accountable cybersecurity and training practices are highly efficient. Suggestions range from establishing a secure environment to increasing management buy-in and integrating compliance. This work helps advance our understanding of ransomware resilience and highlights the key role of organizational security culture. The resulting learnings can help to inform organizations' security posture, ultimately helping them better protect their defenses against ransomware threats.
At the moment, weather data is crucial for supporting neighborhood activities. The economy and trade are both centered in Jakarta, which is also Indonesia's capital. Therefore, it is crucial to have access to weat...
详细信息
This paper explores the development of a multilabel machine learning system for predicting both gender and age from human gait patterns. Gait analysis, a non-intrusive method of identifying subtle nuances in human mov...
详细信息
Dengue fever is mainly caused by female mosquitoes from the genus Aedes. It predominantly occurs in equatorial to sub-tropical regions. The weather factors play a significant role in the mosquito life cycle, so a stud...
详细信息
暂无评论