This paper employs machine learning techniques to combat the escalating threat of phishing attacks in the digital realm. The research builds a predictive model capable of differentiating between phishing and legitimat...
This paper employs machine learning techniques to combat the escalating threat of phishing attacks in the digital realm. The research builds a predictive model capable of differentiating between phishing and legitimate websites by examining a broad range of information retrieved from website URLs, including address bar-based properties, domain characteristics, and webpage content. To ascertain their effectiveness in this task, six well-known machine learning algorithms—Decision Tree, Random Forest, XGBoost, Deep Learning, Autoencoder Neural Network, and Support Vector Machines—are rigorously investigated. Notably, the Multilayer Perceptrons algorithm emerges as the standout performer, achieving an 86.4% accuracy in identifying phishing websites. This endeavor not only advances the field of cybersecurity but also empowers individuals to proactively safeguard themselves against the pervasive threat of phishing attacks in an increasingly interconnected digital landscape.
Tomato is one of the most popular crops worldwide. The success of a tomato crop is highly dependent on the health of the plants. Nutrient deficiency surveillance is typically conducted through visual inspections, whic...
Tomato is one of the most popular crops worldwide. The success of a tomato crop is highly dependent on the health of the plants. Nutrient deficiency surveillance is typically conducted through visual inspections, which can be challenging for inexperienced farmers and home gardeners to work accurately. There is a growing need for a quick, reliable, and accurate nutrient deficiency identification system to address this issue. The proposed method is based on image processing and deep learning technologies that are highly effective for image classification tasks. Two models were trained using a dataset collected from tomato plants in Sri Lanka and evaluated using Mask Region-based Convolutional Neural Network (Mask R-CNN) and, You Only Look Once (YOLO) for deficiency classification, and results obtained 92% and 98% accuracy, respectively. Deficiency dispersion level expressed as a percentage using Mask R-CNN and followed by image processing techniques. Overall, this proposed system offers a convenient and accessible tool for farmers and home gardeners to monitor and maintain the health of their tomato plants, enabling them to achieve optimal yields and ensure profitable returns.
In the field of health care, the use of data for medical insurance is a current area of research. In this report, regression models created using machine learning methods and algorithms for health insurance prediction...
In the field of health care, the use of data for medical insurance is a current area of research. In this report, regression models created using machine learning methods and algorithms for health insurance prediction are the object of investigation. A correlation analysis was performed on the input data, and a strong dependence was found for the features BMI and smoker. A comparative analysis was made for twenty-four models constructed using Decision Trees (DT), Support Vector Machine (SVM), Boosted, and Bagged algorithms. To evaluate the model metrics were used the coefficient of determination (R-Squared), Root Mean Square Error (RMSE) and Time for training. From the obtained experimental results, it is found that the model for the BMI feature with the Bagged algorithm has an accuracy of 0.94. The mean squared error for features Smoker and Blood Pressure of models created with the Bagged algorithm is 0.06. Models built with the Support Vector Method (SVM) require more training time than the others do. Algorithms from machine learning and statistical analysis are used to create regression models that can be useful both for health care providers and to improve the services provided.
Typical autonomous driving systems are a combination of machine learning algorithms (often involving neural networks) and classical feedback controllers. Whilst significant progress has been made in recent years on th...
详细信息
Nanopore sequencing enables reading strings of A,C,G,T nucleotides in DNA strands by pulling them into nanopores with the help of motor proteins. Due to the discrete stepping of motor proteins, the signals produced by...
Nanopore sequencing enables reading strings of A,C,G,T nucleotides in DNA strands by pulling them into nanopores with the help of motor proteins. Due to the discrete stepping of motor proteins, the signals produced by a DNA sequence tend to be piecewise-constant expansions of some underlying real-valued sequence. In this paper, we assume that every k-nucleotide sequence corresponds to a real-valued codeword of length $k$ , and model the nanopore channel as a noisy duplication channel that stretches every sample of a codeword using a geometric distribution, and then adds Gaussian noise. We show that for this channel, a simpler variant of the dynamic time warping (DTW) algorithm performs maximum likelihood decoding. Next, we devise an $O(k^{2})$ - algorithm for bounding the pairwise error probability between two codewords of length $k$ . Finally, we use Scrappie to design codebooks with a storage efficiency of 1 bit per nucleotide and demonstrate using error simulations the accuracy of the calculated error bounds.
The evaluation of flood risk in urban areas characterized by high vulnerability indices is a fundamental task in order to undertake any mitigation action. When flood-induced phenomena affect structures (buildings, bri...
The evaluation of flood risk in urban areas characterized by high vulnerability indices is a fundamental task in order to undertake any mitigation action. When flood-induced phenomena affect structures (buildings, bridges, river banks, etc.) particularly in areas adjacent to rivers, as for the city of Cosenza, the real time detection of any change in the structural response is crucial for a proper safety level assessment. In the present work, a framework for remote monitoring of hydrological events and related structural behaviour is proposed. Data pertaining to the hydro-meteorological event are collected mainly through a series of ultrasonic hydrometers, different types of rain gauges and webcams, to allow a rough estimate of the expected action on the structures. The structural response is monitored through accelerometers (or other instruments) which allows identifying the evolution of the dynamic behaviour, in order to detect insurgent damage phenomena. The acquired structural measurements are employed to tune both fine structural models or rough simplified models. Moreover, the structural monitoring system allows to estimate damages due to other natural events, such as earthquakes, which well suits current philosophies of multi-risk assessment. This study is carried out within the “Smart integrated monitoring system for safe and resilient communities” action of the NRRP Tech4you project.
In this paper, we calculate a union bound for dynamic time warping (DTW)-based decoding of piecewise constant signals corrupted by additive noise and time stretching due to sample duplications, as observed in raw meas...
In this paper, we calculate a union bound for dynamic time warping (DTW)-based decoding of piecewise constant signals corrupted by additive noise and time stretching due to sample duplications, as observed in raw measurement signals obtained from nanopore sequencers. We consider both finitely- and infinitely-supported duplications with geometric-like characteristic, which include discrete uniform distributions as a special case. First, we provide explicit algorithms that calculate the union bound in O(αk 2 ) time for the infinite-support case and in O(β 2 k 2 ) for the finite-support case, where k is the codeword length, α is the minimum duplication, and β is the maximum duplication. Next, we show that a multi-read union bound exhibits a thresholding effect, where the error probability can be made arbitrarily close to zero by aggregating DTW distances from sufficiently many independent reads. Finally, we validate the calculated bounds relative to simulation results.
As the number of multimedia IPs in mobile devices increases, a high memory bandwidth becomes essential. To meet this demand, Application Processors (APs) employ multiple memory channels. However, employing fine-graine...
As the number of multimedia IPs in mobile devices increases, a high memory bandwidth becomes essential. To meet this demand, Application Processors (APs) employ multiple memory channels. However, employing fine-grained channel interleaving leads to frequent bank conflicts in DRAM, resulting in increased energy consumption and reduced battery life. This paper proposes a novel Virtual to Physical address mapping (VA-to-PA) scheme, called Correlation-based Page Remapping (CPR). This technique involves remapping pages based on the access correlations between them to enhance bank parallelism. By increasing the channel interleaving size to 1KB and applying CPR, we can reduce the DRAM energy consumption of activation (ACT) and precharge (PRE) operations by 15% without any decrease in DRAM performance.
The application of Agile methodologies to large-scale, safety-critical cyber-physical systems (LS/SC/CPS) has shown significant interest over the last 5 years. Although there has been limited research into each of the...
详细信息
ISBN:
(数字)9798331506407
ISBN:
(纸本)9798331506414
The application of Agile methodologies to large-scale, safety-critical cyber-physical systems (LS/SC/CPS) has shown significant interest over the last 5 years. Although there has been limited research into each of the individual attributes for de-velopment projects that are large-scale, safety-critical, or cyber-physical systems, there is a scarcity of research when all three attributes exist simultaneously in a development endeavor. This systematic literature review explores the extent of Agile adoption in projects where all three attributes are present. It begins by examining the extent of Agile adoption by domain, identifying the drivers for change, reviewing the challenges encountered, and investigating the augmentations used to address these challenges. The findings indicate that there has been growth in adoption across the medical, aerospace, automotive, and robotics indus-tries, with limited adoption in energy and transportation. Key drivers include speed, adaptability, and cost. Several challenges have been identified, with regulatory/compliance requirements being the most significant. Multiple augmentations to Agile have been applied to overcome the identified challenges, ranging from incorporating safety frameworks and specialized artifacts to leveraging modeling and simulation, as well as reimagining pro-grammatics. This review highlights industry efforts to apply Agile to LS/SC/CPS, while identifying several gaps in the literature. The largest gap is empirical validation in real-world settings. Future research should focus on improving the existing Agile scaling frameworks with guidance and resources to help achieve the benefits of Agile in LS/SC/CPS development while ensuring regulatory and safety compliance.
Minor changes between the designed Flexible hybrid electronic (FHE) devices and the actual realized printed devices are very crucial for the development and maturity of this technology. The quality of printed electron...
详细信息
暂无评论