Detecting pedestrians in a crowded scene in real time is a challenging task in monitoring and managing crowd. Many researchers around the world have addressed this task and managed to achieve satisfactory results. How...
详细信息
Hepatitis C is the liver's festering that can lead to severe liver damage, usually caused by the hepatitis C virus. Hepatitis C has different stages. It is tough to cure in it's last stages;at the same time, i...
详细信息
Internet of Things (IoT) devices are small, low-power devices used for detecting and processing data remotely through the internet. These devices have increasingly been integrated into our daily lives, both in the dig...
详细信息
Sports image classification is a complex problem with many different sports involved. It has subpar detection performance and challenges with feature recognition. The issue of classifying 110 different sports image ca...
详细信息
To build an intelligent intrusion detection system, it is essential to have a suitable and high-quality dataset with a sufficiently large quantity to simulate real-world scenarios. The NSL-KDD dataset is an improved v...
详细信息
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the *** learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and securit...
详细信息
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the *** learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security *** is crucial in offering a proactive security system in the field of *** real time,cybersecurity protects information,information systems,and networks from *** the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity *** an increasing rate,intruders are breaching information *** detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient *** have tried a variety of approaches to address the present cybersecurity obstacles and *** a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of *** projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems.
The present work aims to find computationally-efficient models for solving discretized partial differential equations. To accomplish that, we implement and compare the performance of a series of algorithmic models, bo...
详细信息
Optical Coherence Tomography (OCT) is a relatively recent procedure for studying eyes that has proven to be quite beneficial. We propose automatic detection of the RPE (Retinal Pigment Epithelium) layer in Retinal OCT...
详细信息
In this paper,we study the existence and concentration behavior of the semiclassical states with L2-constraints for the following saturable nonlinear Schr?dinger equation:-ε2Δv+Γ(I(x)+v^(2))/(1+I(x)+v^(2))v=λv fo...
详细信息
In this paper,we study the existence and concentration behavior of the semiclassical states with L2-constraints for the following saturable nonlinear Schr?dinger equation:-ε2Δv+Γ(I(x)+v^(2))/(1+I(x)+v^(2))v=λv for x∈*** a negatively large coupling constantΓ,we show that there exists a family of normalized positive solutions(i.e.,with the L2-constraint)whenεis small,which concentrate around local maxima of the intensity function I(x)asε→*** also consider the case where I(x)may tend to-1 at infinity and the existence of multiple *** proof of our results is variational and the novelty of the work lies in the development of a new truncation-type method for the construction of the desired solutions.
With the revolutionary growth of the Internet of Things (IoT) and the increasing number of chronic disease patients, a trend toward building a reliable, smart prescription system to aid healthcare has emerged. Many pa...
详细信息
暂无评论