Because of the widespread availability of low-cost printers and scanners,document forgery has become extremely *** or signatures are used to protect important papers such as certificates,passports,and identification *...
详细信息
Because of the widespread availability of low-cost printers and scanners,document forgery has become extremely *** or signatures are used to protect important papers such as certificates,passports,and identification *** the origins of printed documents is helpful for criminal investigations and also for authenticating digital versions of a document in today’s *** printer identification(SPI)has become increasingly popular for identifying frauds in printed *** paper provides a proposed algorithm for identifying the source printer and categorizing the questioned document into one of the printer classes.A dataset of 1200 papers from 20 distinct(13)laser and(7)inkjet printers achieved significant identification results.A proposed algorithm based on global features such as the Histogram of Oriented Gradient(HOG)and local features such as Local Binary Pattern(LBP)descriptors has been proposed for printer *** classification,Decision Trees(DT),k-Nearest Neighbors(k-NN),Random Forests,Aggregate bootstrapping(bagging),Adaptive-boosting(boosting),Support Vector Machine(SVM),and mixtures of these classifiers have been *** proposed algorithm can accurately classify the questioned documents into their appropriate printer *** adaptive boosting classifier attained a 96%*** proposed algorithm is compared to four recently published algorithms that used the same dataset and gives better classification accuracy.
Because of the rapid development of communication and service in Taiwan, competition among telecommunication companies has become ever fiercer. Differences in marketing strategy usually become the key factor in keepin...
详细信息
Aquaculture stands as a flourishing industry, serving as a significant financial resource for many. However, it encounters various challenges such as environmental degradation and disease outbreaks. Consequently, main...
详细信息
Smartphones have grown popular in the current digital era among people. Map-based applications are one of many that are used daily by people to acquire information about specific locations. Google Maps and Waze are tw...
详细信息
With the rapid expansion of industrial IoT (IIoT), maintaining robust cybersecurity is essential for the smooth operation of industrial processes. Industrial environments require adaptive solutions to effectively miti...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a vi...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone *** researchers have also emphasised using hybrid models to improve forecast ***,this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years,summarising data preprocessing,univariate machine learning modelling strategy,advantages and disadvantages of standalone ML techniques,hybrid models,and performance *** study focuses on two types of hybrid models:parameter optimisation-based hybrid models(OBH)and hybridisation of parameter optimisation-based and preprocessing-based hybridmodels(HOPH).Overall,this research supports the idea thatmeta-heuristic approaches precisely improveML ***’s also one of the first efforts to comprehensively examine the efficiency of various meta-heuristic approaches(classified into four primary classes)hybridised with ML *** study revealed that previous research applied swarm,evolutionary,physics,and hybrid metaheuristics with 77%,61%,12%,and 12%,***,there is still room for improving OBH and HOPH models by examining different data pre-processing techniques and metaheuristic algorithms.
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect...
详细信息
Today,due to the pandemic of COVID-19 the entire world is facing a serious health *** to the World Health Organization(WHO),people in public places should wear a face mask to control the rapid transmission of *** gove...
详细信息
Today,due to the pandemic of COVID-19 the entire world is facing a serious health *** to the World Health Organization(WHO),people in public places should wear a face mask to control the rapid transmission of *** governmental bodies of different countries imposed that wearing a face mask is compulsory in public ***,it is very difficult to manually monitor people in overcrowded *** research focuses on providing a solution to enforce one of the important preventative measures of COVID-19 in public places,by presenting an automated system that automatically localizes masked and unmasked human faces within an image or video of an area which assist in this outbreak of *** paper demonstrates a transfer learning approach with the Faster-RCNN model to detect faces that are masked or *** proposed framework is built by fine-tuning the state-of-the-art deep learning model,Faster-RCNN,and has been validated on a publicly available dataset named Face Mask Dataset(FMD)and achieving the highest average precision(AP)of 81%and highest average Recall(AR)of 84%.This shows the strong robustness and capabilities of the Faster-RCNN model to detect individuals with masked and un-masked ***,this work applies to real-time and can be implemented in any public service area.
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with ...
详细信息
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with low storage *** this,efficiently organizing an encoded storage system for shared I/Os is critical for application *** is usually hard to achieve as different applications have different stripe configurations and fault tolerance *** this paper,we first study the block trace from the Alibaba cloud,and find that I/O patterns of modern applications prefer the resource sharing *** on this,we propose a globally shared resource paradigm for encoded storage system in the public *** globally shared resource paradigm can provide balanced load and fault tolerance for numerous disk pool sizes and arbitrary application stripe ***,we demonstrate with two case studies that our theory can help address the device-specific problems of HDD and SSD RAID arrays with slight modifications:comparing the existing resource partition and resource sharing methods,our theory can promote the rebuild speed of the HDD RAID arrays by 2.5,and reduce the P99 tail latency of the SSD arrays by up to two orders of magnitude.
Distribution wells in buildings are the blind spots for security monitoring and are prone to safety accidents. In order to make up for the shortcomings of security monitoring, this paper reduces the workload of manual...
详细信息
暂无评论