Semi-supervised learning has garnered significant attention, particularly in medical image segmentation, owing to its capacity to leverage a large number of unlabeled data and a limited amount of labeled data to impro...
详细信息
MOSFET is one of the most popular silicon carbide power electronic devices, is widely popular in base station, energy storage, aerospace and railway scenarios. As one of the score electronic components in power electr...
详细信息
One of the leading causes of car accidents is drowsy driving. the driver drowsiness detection system detects fatigue and helps to avoid accidents. Classic methods include vehicle-based, behavior-based, and physiologic...
详细信息
ISBN:
(纸本)9781665476478
One of the leading causes of car accidents is drowsy driving. the driver drowsiness detection system detects fatigue and helps to avoid accidents. Classic methods include vehicle-based, behavior-based, and physiological-based techniques. Some of these solutions, however, are inconvenient for the driver, while others necessitate the purchase of costly sensors and devices. As a result, this project demonstrates how to build low-cost, real-time driver drowsiness with long-term accuracy. In this system, drowsiness is detected using a webcam. this webcam captures the driver's frames using image processing techniques. For each frame, the eye aspect ratio (EAR) and mouth opening ratio (MOR) is calculated. the computed values and the observed threshold values are used to detect drowsiness.
Alzheimer's disease is a brain ailment that impairs thinking, memory, and behaviour. the efficacy of Brain- Computer Interface (BCI) systems must be enhanced to increase their prevalence in the biomedical sector. ...
详细信息
this paper investigates the accuracy of the different machinelearning algorithms used for calorie estimation through food image processing. Moreover, the most popular food image datasets and calorie calculation techn...
详细信息
Weather Prediction techniques are widely used to predict the almost accurate weather at a particular place on a particular time. After getting success in various fields like image processing, sound prediction etc. Mac...
详细信息
the proceedings contain 28 papers. the topics discussed include: human activity role identification using feature vector and encoding techniques on natural language sentences;access control, biometrics, and the future...
ISBN:
(纸本)9781450398381
the proceedings contain 28 papers. the topics discussed include: human activity role identification using feature vector and encoding techniques on natural language sentences;access control, biometrics, and the future;real-time privacy preserving human activity recognition on mobile using 1DCNN-BiLSTM deep learning;empirical study of emotional state recognition using multimodal fusion framework;monitoring application-driven continuous affect recognition from video frames;a human body part semantic segmentation enabled parsing for human pose estimation;automatic segmentation of pneumothorax in chest radiographs based on dual-task interactive learning method;transformer for hyperspectral image classification based on multi-feature learning;optimal parameter values for estimating rotational eye movement by using vascular images in the white part of the eyeball;and a computational investigation on precision autism and metabolic disorders: predictive machinelearning for hepatic ailment classification.
Free space optical communication (FSOC) is the optical wireless technology that provides enormous bandwidth, unlicensed spectrum, and excellent performance in comparison with radio frequency (RF) technology, which has...
详细信息
One of the most significant and widely used IT breakthroughs nowadays is cloud computing. Today, the majority of enterprises use private or public cloud computing services for their computing infrastructure. Cyber-att...
详细信息
ISBN:
(纸本)9781665476478
One of the most significant and widely used IT breakthroughs nowadays is cloud computing. Today, the majority of enterprises use private or public cloud computing services for their computing infrastructure. Cyber-attackers regularly target Cloud resources by inserting malicious code or obfuscated malware onto the server. these malware programmes that are obfuscated are so clever that they often manage to evade the detection technology that is in place. Unfortunately, they are discovered long after they have done significant harm to the server. machinelearning (ML) techniques have shown to be effective at finding malware in a wide range of fields. To address feature selection (FS) challenges, this study uses the wrapperbased Binary Bat Algorithm (BBA), Cuckoo Search Algorithm (CSA), Mayfly Algorithm (MA), and Particle Swarm Optimization (PSO), and then k-Nearest Neighbor (kNN), Random Forest (RF), and Support Vector machine (SVM) are used to classify the benign and malicious records to measure the performance in terms of various metrics. CIC-MalMem-2022, the most recent malware memory dataset, is used to evaluate and test the proposed approach and it is found that the proposed system is an acceptable solution to detect malware.
the proceedings contain 97 papers. the topics discussed include: circular synthetic aperture radar for near-field terahertz imaging;an integrated vulnerability assessment tool for web applications;a grounded flux cont...
ISBN:
(纸本)9781665476478
the proceedings contain 97 papers. the topics discussed include: circular synthetic aperture radar for near-field terahertz imaging;an integrated vulnerability assessment tool for web applications;a grounded flux controlled incremental/decremental memristor emulator;a novel high performance d-latch using gate engineered Schottky device;electrical and optical characterization of photo anode and metal free counter electrode;advancements in intrusion detection systems for internet of things using machinelearning;cold start problem in recommendation system: a solution model based on clustering and association rule techniques;machinelearning based obfuscated malware detection in the cloud environment with nature-inspired feature selection;mitigation of higher order mode in thz patch antenna using graphene ring;Fourier analysis based respiration rate estimation using corrupted photoplethysmogram signal;and molecular nano communication networks: architectures, protocols and technologies.
暂无评论