作者:
Ratanavilisagul, Chiabwoot
Faculty of Applied Science Department of Computer and Information Science Bangkok Thailand
multi-skills resource-constrained project scheduling problem (MS-RCPSP) is assigned to employees under the predecessor tasks constraint and the multi-skills constraint in order to create the feasible schedule with bot...
详细信息
作者:
Janprasit, SiwachPunkong, NarongRatanavilisagul, ChiabwootKosolsombat, Somkiat
Faculty of Applied Science Department of Computer and Information Science Bangkok Thailand
Digital Technology for Business Faculty of Management Science Kanchanaburi Thailand
Faculty of Applied Science Department of Computer and Information Sciences Bangkok Thailand Thammasat University
Data Science and Innovation College of Interdisciplinary Studies Thailand
handwritten digit recognition is a crucial task in various fields such as postal mail sorting, bank check processing, and digitizing handwritten documents. This research aims to compare the effectiveness of using Conv...
详细信息
The Fourth Industrial Revolution (IR4.0) has shifted the mindsets of engineering students on the importance of IT skills for current and future engineering related jobs. Nowadays, programming is the most fundamental s...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Eye tracking is becoming more and more important as a research method within the field of software engineering (SE). Existing meta-analyses focus on the design or conduct of SE eye tracking studies rather than the ana...
详细信息
In this paper, we propose a novel warm restart technique using a new logarithmic step size for the stochastic gradient descent (SGD) approach. For smooth and non-convex functions, we establish an O(1/√T) convergence ...
详细信息
In this paper, we propose a novel warm restart technique using a new logarithmic step size for the stochastic gradient descent (SGD) approach. For smooth and non-convex functions, we establish an O(1/√T) convergence rate for the SGD. We conduct a comprehensive implementation to demonstrate the efficiency of the newly proposed step size on the FashionMinst, CIFAR10, and CIFAR100 datasets. Moreover, we compare our results with nine other existing approaches and demonstrate that the new logarithmic step size improves test accuracy by 0.9% for the CIFAR100 dataset when we utilize a convolutional neural network (CNN) model.
Cyberbullying remains a pressing issue in Thai social media, especially among teenagers. While many studies have explored deep learning approaches for sentiment analysis or toxicity detection, the detection of cyberbu...
详细信息
Graph Neural Networks (GNNs) have emerged as a widely used and effective method across various domains for learning from graph data. Despite the abundance of GNN variants, many struggle with effectively propagating me...
详细信息
The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic *** this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored d...
详细信息
The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic *** this article,a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored dataset obtained from a private hospital for detecting COVID-19,pneumonia,and normal conditions in chest X-ray images(CXIs)is proposed coupled with Explainable Artificial Intelligence(XAI).Our study leverages less preprocessing with pre-trained cutting-edge models like InceptionV3,VGG16,and VGG19 that excel in the task of feature *** methodology is further enhanced by the inclusion of the t-SNE(t-Distributed Stochastic Neighbor Embedding)technique for visualizing the extracted image features and Contrast Limited Adaptive Histogram Equalization(CLAHE)to improve images before extraction of ***,an AttentionMechanism is utilized,which helps clarify how the modelmakes decisions,which builds trust in artificial intelligence(AI)*** evaluate the effectiveness of the proposed approach,both benchmark datasets and a private dataset obtained with permissions from Jinnah PostgraduateMedical Center(JPMC)in Karachi,Pakistan,are *** 12 experiments,VGG19 showcased remarkable performance in the hybrid dataset approach,achieving 100%accuracy in COVID-19 *** classification and 97%in distinguishing normal ***,across all classes,the approach achieved 98%accuracy,demonstrating its efficiency in detecting COVID-19 and differentiating it fromother chest disorders(Pneumonia and healthy)while also providing insights into the decision-making process of the models.
作者:
El-Houari, HamzaUniversity Moulay Ismail
Faculty of Sciences and Techniques Research Laboratory “Applied Mathematics Computer Science and Systems” Errachidia Morocco
This paper aims to show that there exists a weak solution to the following quasilinear system driven by the M-Laplacian (Formula presented.) where Ω is a bounded open subset in RN and (-Δm) is the M-Laplacian operat...
详细信息
暂无评论