The proceedings contain 19 papers. The topics discussed include: the development and trend of ECG diagnosis assisted by artificial intelligence;learning how to avoiding obstacles for end-to-end driving with conditiona...
ISBN:
(纸本)9781450372213
The proceedings contain 19 papers. The topics discussed include: the development and trend of ECG diagnosis assisted by artificial intelligence;learning how to avoiding obstacles for end-to-end driving with conditional imitation learning;multi-scale fusion and channel weighted CNN for acoustic scene classification;multi-source radar data fusion via support vector regression;multi-scale deep convolutional nets with attention model and conditional random fields for semantic image segmentation;discrete sidelobe clutter determination method based on filtering response loss;deep neural network-based scale feature model for BVI detection and principal component extraction;and an attention-enhanced recurrent graph convolutional network for skeleton-based action recognition.
The proceedings contain 16 papers. The topics discussed include: melanoma classification using feature extraction methods andmachinelearning approaches;strategies to solve the problem of information cocoon â€&q...
The proceedings contain 16 papers. The topics discussed include: melanoma classification using feature extraction methods andmachinelearning approaches;strategies to solve the problem of information cocoon â€" research progress of cross-domain recommendation algorithm based on mining the potential interests of users;the development of ray tracing and its future;convolutional neural network and its application in handwritten digit and traffic sign recognition;a two-step rumor detection and classification method using machinelearning;lip reading using multi-dilation temporal convolutional network;comprehensive survey on video denoise methods;optimization of CNN and LSTM based application on RC frame and long-span structural health monitoring;comparison of underlying algorithms in recommendation systems;and can PID make the electronic stability program more effective? research on co-simulation of electronic stability program.
The proceedings contain 97 papers. The topics discussed include: affective computing for emotion identification using dual-stage filtered multi-channel EEG signals;investigation of the direct source to drain tunneling...
ISBN:
(纸本)9798350310719
The proceedings contain 97 papers. The topics discussed include: affective computing for emotion identification using dual-stage filtered multi-channel EEG signals;investigation of the direct source to drain tunneling in 5 nm nanotube junctionless field effect transistor;analysis and implementation of approximate 4-2 compressors for approximate multipliers;commercial clustering of Indian bamboo species using machinelearning techniques;optimizing MRC tasks: understanding and resolving ambiguities;analyzing word stress and its effects on Assamese and Mizo using machinelearning;anomaly detection by predicting future frames using convolutional LSTM in video surveillance;and suppression of false-terms in Wigner-Ville distribution using time and frequency windowing.
The proceedings contain 36 papers. The special focus in this conference is on machine Intelligence andsignalprocessing. The topics include: Real-time RADAR and LIDAR sensor fusion for automated driving;generalizing ...
ISBN:
(纸本)9789811513657
The proceedings contain 36 papers. The special focus in this conference is on machine Intelligence andsignalprocessing. The topics include: Real-time RADAR and LIDAR sensor fusion for automated driving;generalizing streaming pipeline design for big data;Adaptive fast composite splitting algorithm for MR image reconstruction;extraction of technical and non-technical skills for optimal project-team allocation;modified flower pollination algorithm for optimal power flow in transmission congestion;Intelligent condition monitoring of a CI engine using machinelearning and artificial neural networks;bacterial foraging optimization in non-identical parallel batch processingmachines;healthcare information retrieval based on neutrosophic logic;Convolutional neural network long short-term memory (CNN + LSTM) for histopathology cancer image classification;a novel approach for music recommendation system using matrix factorization technique;forecasting with multivariate fuzzy time series: A statistical approach;nature-inspired algorithm-based feature optimization for epilepsy detection;a combined machine-learning approach for accurate screening and early detection of chronic kidney disease;backpropagation and self-organizing map neural network methods for identifying types of eggplant fruit;head pose prediction while tracking lost in a head-mounted display;recommendation to group of users using the relevance concept;ACA: Attention-based context-aware answer selection system;dense and partial correspondence in non-parametric scene parsing;audio surveillance system;mopsa: Multiple output prediction for scalability and accuracy;Generation of image captions using VGG and resnet CNN models cascaded with RNN approach;impact of cluster sampling on the classification of landsat 8 remote sensing imagery;deep neural networks for out-of-sample classification of nonlinear manifolds;FPGA implementation of LDPC decoder.
Submarines are vital for military defense and national security in strategic communication systems. Power Spectral Density (PSD) characterizes signal spectrum frequency dependence and is crucial for analyzing broadban...
详细信息
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ...
详细信息
In this paper, we present our submission to the EEG-Music Emotion Recognition Challenge at ICASSP 2025. Our work focused on Task 2, where the objective was to classify the emotional state of subjects in a discrete val...
详细信息
The PROCESS Challenge aims to detect cognitive decline, including early stages like mild cognitive impairment, through spontaneous speech. This paper describes TalTech’s systems prepared for the challenge that applie...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
The PROCESS Challenge aims to detect cognitive decline, including early stages like mild cognitive impairment, through spontaneous speech. This paper describes TalTech’s systems prepared for the challenge that applied machinelearning models incorporating multimodal features to address both regression and classification tasks. For regression, the Lasso model achieved an RMSE of 2.54 on the test set, achieving 2nd place in the challenge. For classification, the XGBoost model achieved a macro F1 score of 0.61, placing 6th. These results demonstrate the potential of integrating diverse speech-based features and predictive modeling for scalable, early detection of cognitive decline.
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ...
详细信息
ISBN:
(数字)9798331530389
ISBN:
(纸本)9798331530396
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and the government causing financial losses. Additionally, prolonged DDoS attacks can spoil user experience and degrade company reputation. The recent literature reveals various techniques for detecting DDoS attacks, including pre-trained machinelearning and deep learning algorithms. This research paper addresses this challenge by tweaking random forest algorithms for maximum accuracy using CICDDoS2019 dataset. The methodology includes collecting of dataset, data processing, feature scaling and training multiple machinelearning algorithms to identify maximum accuracy for detecting DDoS attacks. The result shows improvement of accuracy and precision of machinelearning models used. Future work may include training the model for other types of attacks, real time implementation of the model developed, developing a hybrid approach for detection and protection from DDoS attack.
The proliferation of deepfakes-also termed artificial intelligence-generated synthetic media poses unprecedented challenges to the digital authenticity of media, for media integrity, and to societies’ trust in its cr...
详细信息
ISBN:
(数字)9798331530389
ISBN:
(纸本)9798331530396
The proliferation of deepfakes-also termed artificial intelligence-generated synthetic media poses unprecedented challenges to the digital authenticity of media, for media integrity, and to societies’ trust in its credibility. Despite such significant technological advancements, current methodologies for detecting deepfakes remain somewhat fragmented, reactive, and often unable to keep pace with rapidly evolving technologies in generative AI. This article considers a comprehensive multi-modal approach toward deepfake detection by integrating an advanced machinelearning algorithm, novel statistical correlation techniques, and forensic image analysis that would fill in the critical gaps in the existing frameworks. By using an extensive dataset of 10,000 synthetic and authentic media samples from diverse domains, we developed a hybrid neural network architecture that attained 94.3% accuracy on identifying AI-generated content. Our methodology utilized ensemble learning by combining spatial-temporal inconsistency detection, biological signal analysis, and advanced feature extraction algorithms. Key findings demonstrate significant vulnerabilities in current deepfake generation models, with our proposed technique successfully identifying subtle artifacts and inconsistencies across multiple generative AI platforms. This research conclusively demonstrates that proactive, adaptive detection strategies are critical to mitigating the potential risks associated with synthetic media, providing a robust framework for future technological interventions in digital forensics and media authentication.
暂无评论