The proceedings contain 39 papers. The special focus in this conference is on Recent Advances in Digital Security. The topics include: Modern vs Diplomatic Transcripts for Historical Handwritten Text recognition;impro...
ISBN:
(纸本)9783030307530
The proceedings contain 39 papers. The special focus in this conference is on Recent Advances in Digital Security. The topics include: Modern vs Diplomatic Transcripts for Historical Handwritten Text recognition;improving Ancient Cham Glyph recognition from Cham Inscription images Using Data Augmentation and Transfer learning;Oracle Bone Inscription Detector Based on SSD;shot Boundary Detection for Automatic Video Analysis of Historical Films;the Epistle to Cangrande Through the Lens of Computational Authorship Verification;a Cockpit of Measures for image Quality Assessment in Digital Film Restoration;augmented Reality for the Valorization and Communication of Ruined Architecture;classification of Arabic Poems: from the 5th to the 15th Century;a Page-Based Reject Option for Writer Identification in Medieval Books;on the Cross-Finger Similarity of Vein patterns;minimizing Training Data for Reliable Writer Identification in Medieval Manuscripts;fusion of Visual and Anamnestic Data for the Classification of Skin Lesions with Deep learning;slide Screening of Metastases in Lymph Nodes via Conditional, Fully Convolutional Segmentation;A learning Approach for Informative-Frame Selection in US Rheumatology images;a Serious Game to Support Decision Making in Medical Education;nerve Contour Tracking for Ultrasound-Guided Regional Anesthesia;Skin Lesions Classification: A Radiomics Approach with Deep CNN;semantic 3D Object Maps for Everyday Robotic Retail Inspection;collecting Retail Data Using a Deep learning Identification Experience;a Large Scale Trajectory Dataset for Shopper Behaviour Understanding;Improving Multi-scale Face recognition Using VGGFace2;An IOT Edge-Fog-Cloud Architecture for Vision Based Pallet Integrity;the Vending Shopper Science Lab: Deep learning for Consumer Research.
作者:
Nadaf, JuberKadam, AmolJadhav, PramodKadam, PrasadPatil, VinodGaikwad, Milind
College of Engineering Department of Computer Pune India
College of Engineering Department of CSBS Pune India
College of Engineering Department of E & TC Pune India
College of Engineering Department of Information Technology Pune India
Number Plate recognition or the vehicle License Plate recognition is an interesting topic of research in smart cities which utilizes imageprocessing techniques. Since the number of cars is rising at an exponential ra...
详细信息
A prototype of a blind assisting system that utilizes machinelearning for real-time object detection and classification to help visually impaired people to navigate independently without relying on external assistanc...
详细信息
Neuromorphic computing extends beyond sequential processing modalities and outperforms traditional von Neumann architectures in implementing more complicated tasks, e.g., patternprocessing, imagerecognition, and dec...
详细信息
Neuromorphic computing extends beyond sequential processing modalities and outperforms traditional von Neumann architectures in implementing more complicated tasks, e.g., patternprocessing, imagerecognition, and decision making. It features parallel interconnected neural networks, high fault tolerance, robustness, autonomous learning capability, and ultralow energy dissipation. The algorithms of artificial neural network (ANN) have also been widely used because of their facile self-organization and self-learning capabilities, which mimic those of the human brain. To some extent, ANN reflects several basic functions of the human brain and can be efficiently integrated into neuromorphic devices to perform neuromorphic computations. This review highlights recent advances in neuromorphic devices assisted by machinelearning algorithms. First, the basic structure of simple neuron models inspired by biological neurons and the information processing in simple neural networks are particularly discussed. Second, the fabrication and research progress of neuromorphic devices are presented regarding to materials and structures. Furthermore, the fabrication of neuromorphic devices, including stand-alone neuromorphic devices, neuromorphic device arrays, and integrated neuromorphic systems, is discussed and demonstrated with reference to some respective studies. The applications of neuromorphic devices assisted by machinelearning algorithms in different fields are categorized and investigated. Finally, perspectives, suggestions, and potential solutions to the current challenges of neuromorphic devices are provided. The review discusses the basic structure of simple neuron models inspired by biological neurons and how they process information in simple neural networks, laying the foundation for neuromorphic device *** progress in the fabrication of neuromorphic devices is highlighted, focusing on advancements in materials, structures, and the development of st
This paper presents a novel approach for enhancing vehicle safety and navigation through an integrated system for lane detection, vehicle alignment, and automatic braking using visual feedback. Our proposed system emp...
详细信息
Research in the Delhi NCR area from 2000 to 2024 is compared in this study. Firstly, a flash flood occurred due to the heavy rain in July 2013. Grasslands are among the vegetative types in L ULC, which cannot be univo...
详细信息
Jaundice, also called congenital hyperbilirubinemia, is a common condition caused by alterations in an infant’s red blood cell metabolism within the initial week of life. There are many symptoms associated with this ...
详细信息
Sarcasm detection in social media is a challenging task due to its inherent reliance on contextual cues, tone, and cultural nuances. In recent years, multi-model deep learning frameworks have emerged as a powerful app...
详细信息
ISBN:
(纸本)9798350355611
Sarcasm detection in social media is a challenging task due to its inherent reliance on contextual cues, tone, and cultural nuances. In recent years, multi-model deep learning frameworks have emerged as a powerful approach for addressing these challenges, particularly in regional social media, where language variations and local idiomatic expressions complicate the detection process. This survey explores the latest developments in multi-model deep learning frameworks for sarcasm detection, focusing on their application in regional social media. The survey begins by reviewing foundational techniques in sarcasm detection, including traditional machinelearning approaches that rely on handcrafted features. These methods, although effective in certain contexts, often fail to capture the subtleties of sarcasm in informal, region-specific languages. The advent of deep learning has led to significant advancements, particularly through models like Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and Transformers. These architectures, combined with Natural Language processing (NLP) techniques, have enhanced the ability to identify sarcasm through text analysis. However, single-modal approaches focusing solely on text fail to fully capture sarcasm's multimodal nature, especially on platforms where users often express themselves through a combination of text, images, emojis, and video. This has led to the development of multi-model frameworks that integrate various data modalities, such as text, image, and user behaviour, to better understand the context of sarcastic expressions. In regional social media, where local language and cultural symbols play a crucial role, these multi-model approaches prove even more valuable. This survey highlights key multi-model frameworks, emphasizing their use in regional settings. By examining datasets, model architectures, and evaluation metrics, the survey underscores the importance of combining textual and non-textual
Four-dimensional computed tomography (4DCT) is a time-resolved, multi-modal imaging method that captures respiratory signals synchronised with the CT scan in order to track the movement of the lung. It is routinely us...
详细信息
The proceedings contain 36 papers. The special focus in this conference is on Web Information Systems Engineering. The topics include: Effective Transparent Monitoring of Personal Data;iCNN-LstM: An Incremental C...
ISBN:
(纸本)9789819614820
The proceedings contain 36 papers. The special focus in this conference is on Web Information Systems Engineering. The topics include: Effective Transparent Monitoring of Personal Data;iCNN-LstM: An Incremental CNN-LstM Based Ransomware Detection System;a Mini Review on Purchaser Security in the Metaverse: Challenges and Solutions;low-Resource Dataset Synthetic Generation for Hate Speech Detection;Web Open Data to SDG Indicators: Towards an LLM-Augmented Knowledge Graph Solution;leveraging Sentence-Transformers to Overcome Query-Document Vocabulary Mismatch in Information Retrieval;time Distance Aware for Multi-component Graph Collaborative Filtering;scientific Documents Recommendation Based on Graph Convolutional Network;semantic Communication of images Using image Generation and image Captioning Models;leveraging Optimization Techniques for Effective Arabic Query Expansion;DURLLCON: Deep Reinforcement learning for URLLC Optimization in Multi-edge Networks;FMM-RNS: A Fast HMM Map Matching Method Based on Road Network Simplification;Context-Aware Selection of machinelearning as a Service (MLaaS) in IoT Environments;GraphTFD: A Fraud Detection System Based on Graph Transformer;MLGE-AC-UFD: Multi-level Graph Embedding and Approximate Computation for Unsupervised Fraud Detection;SeCORE: Quantitative Security Assurance and Evaluation Platform;developing Geospatial Web Applications Using Question Answering Engines, Knowledge Graphs and Linked Data Tools;A Visual Query Builder for DBpedia;FL-PPELA: Partial Parameter Enhancement and Local Adaptive Aggregation for Personalized Federated learning;ORCPM: An Online Regional Core pattern Mining System;MTRM: A Web-Miner Multi-Threshold Mining Co-location patterns to Mitigate Redundancy;constrained Path Optimization on Time-Dependent Road Networks;prompt strategies for Sarcastic Meme Detection: A Comparative Analysis;Deepfake Detection in Cancer Medical Imaging Using CNN Architectures;strengthening Cybersecurity: The Influence o
暂无评论