Agriculture is important in emerging nations like India, but food security is still a serious problem. Plant diseases, inadequate storage facilities, and poor transportation cause the majority of harvests to be squand...
详细信息
Agriculture is important in emerging nations like India, but food security is still a serious problem. Plant diseases, inadequate storage facilities, and poor transportation cause the majority of harvests to be squandered. Since illnesses cause almost 15% of India’s crop yield to be lost, this is a big issue that needs to be addressed. This proposed model is an automated system that can identify the diseases and assist farmers to take the necessary action to cure the crop losses. Farmers have been using the traditional method of using their own eyes to detect plant illnesses, but not all farmers can detect these diseases in the same way. computer vision capabilities must be incorporated into agriculture given the advancements in artificial intelligence. The proposed model uses a convolutional neural network (CNN) with Recurrent Neural Network (RNN) for PlantVillage dataset, the greatest publicly accessible dataset. The proposed model has a 99.37% prediction accuracy for the condition. The proposed approach can identify 14 different plant classes out of the 38 and other moderate in the Plant Village dataset shows how versatile it is. Farmers may decrease crop loss and enhance crop quality and output using this automated and user-friendly technique. In this study, we present the use of a deep recurrent neural network to automatically detect plant diseases. The resulting algorithm is used to identify the bacterial blight of rice during the growing season with a detection accuracy of 99.16%, a classification accuracy of 99.17%, and a sensor-based detection accuracy of 98.98%. Recurrent networks have made great advances in various sequence modeling, such as speech recognition, language modeling, image captioning, and many other applications in recent years. We detect the bacterial blight of rice leaves in this study with a deep recurrent network. We use a stacked LSTM-CNN network to train representations for the radio signal data collected during the lifespan of the rice
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episo...
详细信息
Reinforcement learning holds promise in enabling robotic tasks as it can learn optimal policies via trial and ***,the practical deployment of reinforcement learning usually requires human intervention to provide episodic resets when a failure *** manual resets are generally unavailable in autonomous robots,we propose a reset-free reinforcement learning algorithm based on multi-state recovery and failure prevention to avoid failure-induced *** multi-state recovery provides robots with the capability of recovering from failures by self-correcting its behavior in the problematic state and,more importantly,deciding which previous state is the best to return to for efficient *** failure prevention reduces potential failures by predicting and excluding possible unsafe actions in specific *** simulations and real-world experiments are used to validate our algorithm with the results showing a significant reduction in the number of resets and failures during the learning.
By presenting an improved Intrusion Detection System (IDS) that combines deep learning with support vector machines (SVM), this research increases network security. The main goal is to increase the accuracy of SVM det...
详细信息
Early identification of skin cancer is mandatory to minimize the worldwide death rate as this disease is covering more than 30% of mortality rates in young and adults. Researchers are in the move of proposing advanced...
详细信息
Leakage accidents in natural gas pipelines bring huge property losses and pose serious safety risks. Therefore, faster and more accurate leakage localization is of great significance. In this article, a new method bas...
详细信息
Providing accurate and timely traffic information such as arriving time of train plays a significant part in intelligent train status prediction. Maximum-speed train status forecast is a significant topic as far as ra...
详细信息
Better patient outcomes and prompt care depend on early detection of heart attacks. In this current work, we use the infamous MIT-BIH Arrhythmia Dataset, a reference resource for cardiac abnormality recognition, to tr...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Large language models (LLMs) embed extensive knowledge and utilize it to perform exceptionally well across various tasks. Nevertheless, outdated knowledge or factual errors within LLMs can lead to misleading or incorr...
详细信息
Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,mos...
详细信息
Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,most existing traffic classification techniques are inapplicable to the high-speed network *** this paper,we propose a High-speed Encrypted Traffic Classification(HETC)method containing two ***,to efficiently detect whether traffic is encrypted,HETC focuses on randomly sampled short flows and extracts aggregation entropies with chi-square test features to measure the different patterns of the byte composition and distribution between encrypted and unencrypted ***,HETC introduces binary features upon the previous features and performs fine-grained traffic classification by combining these payload features with a Random Forest *** experimental results show that HETC can achieve a 94%F-measure in detecting encrypted flows and a 85%–93%F-measure in classifying fine-grained flows for a 1-KB flow-length dataset,outperforming the state-of-the-art comparison ***,HETC does not need to wait for the end of the flow and can extract mass computing *** average time for HETC to process each flow is only 2 or 16 ms,which is lower than the flow duration in most cases,making it a good candidate for high-speed traffic classification.
暂无评论