Text classification is a process of locating text documents automatically into categories based on the text content. In-text classification, there is a stage that has an important role in giving the value of importanc...
详细信息
We experimentally demonstrate reduced dimensionality in a interacting ensemble of emitters. The well-known stretched exponential decay dynamics, (Equation presented) with β = 0.5 in 3D geometries, is strikingly modif...
详细信息
Diabetic retinopathy (DR) is a type of diabetes mellitus that attacks the retina of the eye. DR will cause patients to experience blindness slowly. Generally, DR can be detected by using a special instrument called an...
详细信息
Diabetic retinopathy (DR) is a type of diabetes mellitus that attacks the retina of the eye. DR will cause patients to experience blindness slowly. Generally, DR can be detected by using a special instrument called an ophthalmoscope to view the inside of the eyeball. However, in conditions where there is a very small difference between the normal image and the DR image, computer-based assistance is needed for maximizing image reading value. In this research, a method of image quality improvement will be carried out which will then be integrated with a classification algorithm based on deep learning. The results of image improvement using Contrast Limited Adaptive Histogram Equalization (CLAHE) shows that the average accuracy of the method on several models is very competitive, 91% for the VGG16 model, 95% for InceptionV3, and 97% for EfficientNet compared to the results original image which only has an accuracy of 87% for VGG16 model, 90% for InceptionV3 model, and 95% for EfficientNet. However, in ResNet34 better accuracy is obtained in the original image with an accuracy of 95% while in the CLAHE image the accuracy value is only 84%. The results of this comprehensive evaluation and recommendation of famous backbone networks can be useful in the computer-aided diagnosis of diabetic retinopathy.
The RSA public key cryptosystem was among the first algorithms to implement the Diffie-Hellman key exchange protocol. At the core of RSA's security is the problem of factoring its modulus, a very large integer, in...
详细信息
Society 5.0 focuses on human productivity in the midst of advanced technological services. While the concept has human trust at its core, technology development is now leading to zero-trust architecture. In this scien...
详细信息
Since the corona pandemic, many internet users have maximized their interactions with the internet to minimize face-to-face meetings. As a result, many collaborative filtering algorithms, which are part of recommender...
Since the corona pandemic, many internet users have maximized their interactions with the internet to minimize face-to-face meetings. As a result, many collaborative filtering algorithms, which are part of recommender systems, have been optimized so that users can obtain the best results. Collaborative filtering is an approach to providing recommendations that relies on the interactions and preferences of past users. Essentially, recommendations are generated by considering how users with similar preferences and behaviors have interacted. There are two primary forms of collaborative filtering: user-user and item-item. User-user collaborative filtering suggests recommendations based on users who share similar preferences with the current user. On the other hand, item-item collaborative filtering suggests recommendations based on items that are frequently selected together by other users. Both types of collaborative filtering rely on user interaction and preference data to deliver effective results. The latest trend related to collaborative filtering involves the use of geographic information. This paper aims to map the research developments related to collaborative filtering with geographic information in recent years, including the algorithms used, implementation issues, and challenges faced. Our hope is that this research can provide an overview of where this technology is heading.
Nowadays, every company knows that when making a decision that has a potential in affecting their assets, an accurately processed report is necessary in order to support the reasoning behind their decision. Generating...
详细信息
This paper describes the implementation and evaluation of an RC polyphase filter (RCPF) and circuitry for measuring its frequency characteristics. The integrated circuit is fabricated on a 0.6 µm CMOS process and...
详细信息
Multi-robot systems can provide substantial increase in efficiency and/or flexibility in different scenarios. Applications in various settings have been studied in the literature, such as disaster management, surveill...
Multi-robot systems can provide substantial increase in efficiency and/or flexibility in different scenarios. Applications in various settings have been studied in the literature, such as disaster management, surveillance, object transportation as well as search-and-rescue. A particular case that can highly benefit from the employment of multiple agents is the logistics in a warehouse scenario. This work proposes an multi-agent Q-learning based algorithm with curriculum learning and transfer learning to perform the path planning process. With progressively more complex stages of training as well as knowledge transfer from one stage to another, the algorithm is capable of achieve high success rates. In order to validate the proposed method, simulations were done to compare it to other combinations of the used techniques, as well as using Q-learning only. Scalability tests were also performed. The proposed method achieved up to 94% success rate after training.
The number of Android malicious applications keeps growing as time passes, even paving their way to official app markets. In recent years, a promising malware detection approach makes use of the compiled app source co...
详细信息
The number of Android malicious applications keeps growing as time passes, even paving their way to official app markets. In recent years, a promising malware detection approach makes use of the compiled app source codes (dex), through convolutional neural networks (CNN) as an image classification task. Unfortunately, current proposals often rely on unrealistic datasets, focusing their detection on the mal-ware families, while neglecting the detection of malware apps in the first place. In this paper, we propose a reliable and hierarchical Android malware detection through an image-based CNN scheme, implemented twofold. First, Android malware classification is performed in a hierarchically-structured local manner, initially identifying malware apps, then, their related family. Second, to ensure reliability and improve classification accuracy, only highly confident classified apps are reported, in a classification with reject option rationale. Experiments performed in a new dataset with over 26 thousand Android apps, divided into 29 malware families, compounding over 13 GB of app dex images, have shown that current image-based CNN for malware detection is unable to provide high detection accuracies. In contrast, our proposed model is able to reliably detect malware apps, improving the true-negative rates by up to 5.5%, and the average true-positive rate of the malware families of accepted apps by up to 12.7%, while rejecting only 10% of Android apps.
暂无评论