Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning...
详细信息
Crop diseases have a significant impact on plant growth and can lead to reduced *** methods of disease detection rely on the expertise of plant protection experts,which can be subjective and dependent on individual ex...
详细信息
Crop diseases have a significant impact on plant growth and can lead to reduced *** methods of disease detection rely on the expertise of plant protection experts,which can be subjective and dependent on individual experience and *** address this,the use of digital image recognition technology and deep learning algorithms has emerged as a promising approach for automating plant disease *** this paper,we propose a novel approach that utilizes a convolutional neural network(CNN)model in conjunction with Inception v3 to identify plant leaf *** research focuses on developing a mobile application that leverages this mechanism to identify diseases in plants and provide recommendations for overcoming specific *** models were trained using a dataset consisting of 80,848 images representing 21 different plant leaves categorized into 60 distinct *** rigorous training and evaluation,the proposed system achieved an impressive accuracy rate of 99%.This mobile application serves as a convenient and valuable advisory tool,providing early detection and guidance in real agricultural *** significance of this research lies in its potential to revolutionize plant disease detection and management *** automating the identification process through deep learning algorithms,the proposed system eliminates the subjective nature of expert-based diagnosis and reduces dependence on individual *** integration of mobile technology further enhances accessibility and enables farmers and agricultural practitioners to swiftly and accurately identify diseases in their crops.
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit...
详细信息
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining ***,these tools suffer from some *** terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search ***,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information *** this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation *** leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion *** combination allows for the unified handling of binary programs across various architectures,compilers,and compilation ***,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)***,the graph embedding network is utilized to evaluate the similarity of program *** on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target *** solved content serves as the initial seed for targeted *** binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity *** approach facilitates
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL me...
详细信息
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL methods often require substantial computational resources,hindering their application on resource-constrained *** propose the Deep Tomato Detection Network(DTomatoDNet),a lightweight DL-based framework comprising 19 learnable layers for efficient tomato leaf disease classification to overcome *** Convn kernels used in the proposed(DTomatoDNet)framework is 1×1,which reduces the number of parameters and helps in more detailed and descriptive feature extraction for *** proposed DTomatoDNet model is trained from scratch to determine the classification success rate.10,000 tomato leaf images(1000 images per class)from the publicly accessible dataset,covering one healthy category and nine disease categories,are utilized in training the proposed DTomatoDNet *** specifically,we classified tomato leaf images into Target Spot(TS),Early Blight(EB),Late Blight(LB),Bacterial Spot(BS),Leaf Mold(LM),Tomato Yellow Leaf Curl Virus(YLCV),Septoria Leaf Spot(SLS),Spider Mites(SM),Tomato Mosaic Virus(MV),and Tomato Healthy(H).The proposed DTomatoDNet approach obtains a classification accuracy of 99.34%,demonstrating excellent accuracy in differentiating between tomato *** model could be used on mobile platforms because it is lightweight and designed with fewer *** farmers can utilize the proposed DTomatoDNet methodology to detect disease more quickly and easily once it has been integrated into mobile platforms by developing a mobile application.
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran...
详细信息
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the transmission may be aborted due to insufficient funds(also called balance) or a low transmission rate. To increase the success rate and reduce transmission delay across all transactions, this work proposes a transaction transmission model for blockchain channels based on non-cooperative game *** balance, channel states, and transmission probability are fully considered. This work then presents an optimized channel transaction transmission algorithm. First, channel balances are analyzed and suitable channels are selected if their balance is sufficient. Second, a Nash equilibrium point is found by using an iterative sub-gradient method and its related channels are then used to transmit transactions. The proposed method is compared with two state-of-the-art approaches: Silent Whispers and Speedy Murmurs. Experimental results show that the proposed method improves transmission success rate, reduces transmission delay,and effectively decreases transmission overhead in comparison with its two competitive peers.
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study prop...
详细信息
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study proposes an edge task scheduling approach based on an improved Double Deep Q Network(DQN),which is adopted to separate the calculations of target Q values and the selection of the action in two networks.A new reward function is designed,and a control unit is added to the experience replay unit of the *** management of experience data are also modified to fully utilize its value and improve learning *** learning agents usually learn from an ignorant state,which is *** such,this study proposes a novel particle swarm optimization algorithm with an improved fitness function,which can generate optimal solutions for task *** optimized solutions are provided for the agent to pre-train network parameters to obtain a better cognition *** proposed algorithm is compared with six other methods in simulation *** show that the proposed algorithm outperforms other benchmark methods regarding makespan.
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ...
详细信息
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR ...
详细信息
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR algorithms emphasize the extraction and integration of general image features,while ignoring the mining of salient features that play a key role in the discrimination of VPR *** this end,this paper proposes a Domain-invariant information Extraction and Optimization Network(DIEONet)for *** core of the algorithm is a newly designed Domain-invariant information Mining Module(DIMM)and a Multi-sample Joint Triplet Loss(MJT Loss).Specifically,DIMM incorporates the interdependence between different spatial regions of the feature map in the cascaded convolutional unit group,which enhances the model’s attention to the domain-invariant static object *** Loss introduces the“joint processing of multiple samples”mechanism into the original triplet loss,and adds a new distance constraint term for“positive and negative”samples,so that the model can avoid falling into local optimum during *** demonstrate the effectiveness of our algorithm by conducting extensive experiments on several authoritative *** particular,the proposed method achieves the best performance on the TokyoTM dataset with a Recall@1 metric of 92.89%.
Currently, the basis for critical nodes definition and identification lies in the representation learning of the network and the extraction of local and global features of the nodes. The effectiveness of the algorithm...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can quickly fabricate comments and news on social *** most difficult challenge is determining which news is real or ***,tracking down programmed techniques to recognize fake news online is *** an emphasis on false news,this study presents the evolution of artificial intelligence techniques for detecting spurious social media *** study shows past,current,and possible methods that can be used in the future for fake news *** different publicly available datasets containing political news are utilized for performing *** supervised learning algorithms are used,and their results show that conventional Machine Learning(ML)algorithms that were used in the past perform better on shorter text *** contrast,the currently used Recurrent Neural Network(RNN)and transformer-based algorithms perform better on longer ***,a brief comparison of all these techniques is provided,and it concluded that transformers have the potential to revolutionize Natural Language Processing(NLP)methods in the near future.
暂无评论