Transcriptome-wide association studies (TWAS) goal is to better understand the etiology of diseases and develop preventative and therapeutic approaches by examining the connections between genetic variants and phenoty...
详细信息
Clever system that can look at pictures of fruits and figure out what kind of fruit each picture shows. AI algorithms like deep learning, which is like giving the Machine learning model a crash course in fruit recogni...
详细信息
Tomato plants are vulnerable to different types of diseases, which can lead to significant reductions in yield and quality. Accurate and early detection is therefore crucial to mitigate these losses. This research pro...
详细信息
Many in computer vision and computational imaging consider Generative Adversarial Networks (GANs) a big advance. Style transfer converts semantic visual content into creative styles. Recently, GANs for style transfer ...
详细信息
Recently, Neural Radiance Fields(NeRF) have shown remarkable performance in the task of novel view synthesis through multi-view. The present study introduces an advanced optimization framework, termed Pose Interpolati...
详细信息
The issue of cheating during exams has become a significant concern, gaining widespread attention from the public and media. This issue has been made worse by the transition of educational institutions to an online fo...
详细信息
Optimizing machine learning (ML) models often involves tuning various hyper parameters to achieve optimal performance. Traditional methods for optimization, such as grid search and random search, are not always effect...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in *** the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the *** this background,there is a drastic increase observed in the number of phishing emails sent to potential *** scenario necessitates the importance of designing an effective classification *** numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the *** current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)*** aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing *** the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word ***,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature ***,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing ***,the CS algorithm is used to fine-tune the parameters involved in the GRU *** performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several *** comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing *** proposed model achieved a maximum accuracy of 99.72%.
Around the world, vehicle accidents claim many priceless lives. To tackle this problem, the Vehicular ad hoc networks (VANETs) are the most effective solution. Effective communication between vehicular nodes in VANETs...
详细信息
Pre-trained language models have significantly advanced text summarization by leveraging extensive pre-training data to enhance performance. Many cutting-edge models undergo an initial pre-training phase on a large co...
详细信息
暂无评论