|
|
|
Lei Yang, Mengxue Xu and Yunan He
Convolutional Neural Networks (CNNs) have become essential in deep learning applications, especially in computer vision, yet their complex internal mechanisms pose significant challenges to interpretability, crucial for ethical applications. Addressing t...
ver más
|
|
|
|
|
|
|
Yongzhen Zhang, Yanbo Hui, Ying Zhou, Juanjuan Liu, Ju Gao, Xiaoliang Wang, Baiwei Wang, Mengqi Xie and Haonan Hou
Moldy corn produces aflatoxin and gibberellin, which can have adverse effects on human health if consumed. Mold is a significant factor that affects the safe storage of corn. If not detected and controlled in a timely manner, it will result in substantia...
ver más
|
|
|
|
|
|
|
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d...
ver más
|
|
|
|
|
|
|
Maisarah Mohd Sufian, Ervin Gubin Moung, Mohd Hanafi Ahmad Hijazi, Farashazillah Yahya, Jamal Ahmad Dargham, Ali Farzamnia, Florence Sia and Nur Faraha Mohd Naim
COVID-19, an infectious coronavirus disease, has triggered a pandemic that has claimed many lives. Clinical institutes have long considered computed tomography (CT) as an excellent and complementary screening method to reverse transcriptase-polymerase ch...
ver más
|
|
|
|
|
|
|
Abigail Copiaco, Leena El Neel, Tasnim Nazzal, Husameldin Mukhtar and Walid Obaid
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extractio...
ver más
|
|
|
|
|
|
|
Bimo Sunarfri Hantono, Syukron Abu Ishaq Alfarozi, Azkario Rizky Pratama, Ahmad Ataka Awwalur Rizqi, I Wayan Mustika, Mardhani Riasetiawan and Anna Maria Sri Asih
Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically focus...
ver más
|
|
|
|
|
|
|
Artur Kulaszka, Józef Blachnio and Henryk Borowczyk
The reliability and operational safety of an aircraft engine gas turbine are extremely important in terms of its operation. In the course of operation, these turbines undergo complex thermal, mechanical, aerodynamic, and chemical exhaust gas loads. Due t...
ver más
|
|
|
|
|
|
|
Pradeep S. Naulia, Arunava Roy, Junzo Watada and Izzatdin B. A. Aziz
The purpose of the current study is to propose a novel meta-heuristic image analysis approach using multi-objective optimization, named ?Pixel-wise k-Immediate Neighbors? to identify pores and fractures (both natural and induced, even in the micro-level)...
ver más
|
|
|
|
|
|
|
Haolei Zhang, Jiangtao Ji, Hao Ma, Hao Guo, Nan Liu and Hongwei Cui
To address the problem of low efficiency and automatically sense the phenotypic characteristics of wheat seeds, a wheat seed phenotype detection device was designed to predict thousand seed weight. Five commonly used varieties of wheat seeds were selecte...
ver más
|
|
|
|
|
|
|
Min-Jen Tsai, Ya-Chu Lee and Te-Ming Chen
QR codes (short for Quick Response codes) were originally developed for use in the automotive industry to track factory inventories and logistics, but their popularity has expanded significantly in the past few years due to the widespread applications of...
ver más
|
|
|
|