Breast cancer causes numerous deaths worldwide;yet the numbers have decreased in the past years as a result of computer-aided diagnosis and proper treatment. The current paper is addressed to the base of such diagnosi...
详细信息
The proceedings contain 35 papers. The special focus in this conference is on Advances in Distributed Computing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Fea...
ISBN:
(纸本)9789819718405
The proceedings contain 35 papers. The special focus in this conference is on Advances in Distributed Computing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Features of ECG Signal;block-Chain and Cloud-Based Tender Allocation System;reliability Assessment of IoT-Enabled systems Using Fault Trees and Bayesian Networks;resnet-50 Integrated with Attention Mechanism for Remote Sensing Classification;revolutionizing Data Annotation with Convergence of Deep Learning and Active Learning to Enhance Credibility on Twitter Datasets;statistical and Deep-Learning Approaches for Individual Carbon Footprint Calculation in India;intelligent Healthcare System Using Emerging Technologies: A Comprehensive Survey;Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network;cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture;facial Detection and Recognition in Drone imagery Using FaceNet;valluvan: processing Name Board images to Enhance Communication for Native Tamil Speakers;Optimized VM Migration for Energy and Cost Reduction Using TSO Algorithm in Cloud Computing;A Study on the Mental Health Among Indian Population in the Post COVID-19 Pandemic Using Computational Intelligence;Cloud-Based Anomaly Detection for Broken Rail Track Using LSTM Autoencoders and Cross-modal Audio Analysis;Face Recognition Using CNN for Monitoring and Surveillance of Neurological Disorder Patients;a Novel Approach to Breast Cancer Histopathological image Classification Using Cross-colour Space Feature Fusion and Quantum–Classical Stack Ensemble Method;comparative Analysis of Deep Learning-Based Hybrid algorithms for Liver Disease Prediction;preface;performance Improvements of Covert Timing Channel Detection in the Era of Artificial Intelligence;sign Detection Using an N-Gram Language Model and MobileNet.
Sign language is the primary means of communication for the deaf and mute community. The regional and national differences in sign language have led to barriers between different sign language systems, making communic...
详细信息
ISBN:
(数字)9798350356656
ISBN:
(纸本)9798350356663
Sign language is the primary means of communication for the deaf and mute community. The regional and national differences in sign language have led to barriers between different sign language systems, making communication between deaf and mute individuals from different regions challenging. This paper proposes a vision-tactile fusion approach to recognize sign language. The scheme applies a flexible sensor data glove to monitor the angle changes of finger joints, as well as visual imageprocessing technology, to integrate tactile and visual data for sign language recognition. The integration is performed through three methods: weighted average, weighted multiplication, and attention weights, with accuracy rates of 95.55%, 97.87%, and 98.83%, respectively.
Especially in static situations, image stitching has been routinely used to seamlessly merge many photographs into a panorama. Using it in dynamic and real-time environments, however, presents a number of difficulties...
详细信息
ISBN:
(数字)9798331509293
ISBN:
(纸本)9798331509309
Especially in static situations, image stitching has been routinely used to seamlessly merge many photographs into a panorama. Using it in dynamic and real-time environments, however, presents a number of difficulties, such as managing shifting objects, changing surroundings, and processing limitations. An image stitching look at that works well in dynamic real-time situations is presented in this paper. The method makes use of GNN-based feature matching, dynamic object removal, and real-time synthesis techniques. Comparative studies suggest that, in comparison to traditional methods like SIFT and ORB, the suggested approach meets real-time processing requirements while achieving greater registration precision, lower homography RMSE, and consistent panoramic outputs. The findings imply that the algorithm might be used in fields where precision and efficiency are required in dynamic circumstances, like parking management systems, sports broadcasting, and autonomous driving.
In order to meet the real-time detection and processing requirements of on-board targets in the field of remote sensing imageprocessing, this paper carries out relevant research from the perspective of software optim...
详细信息
ISBN:
(数字)9798350363951
ISBN:
(纸本)9798350363968
In order to meet the real-time detection and processing requirements of on-board targets in the field of remote sensing imageprocessing, this paper carries out relevant research from the perspective of software optimization and proposes an onboard adaptive image windowing processing method based on differential evolution algorithm to solve the problem of shortage of on-board hardware computing resources. Based on the adaptive differential evolution algorithm, combined with the engineering application scenario, the algorithm innovatively designs an individual objective function to evaluate the “advantages and disadvantages“ of the algorithm evolution results. By coordinating all the target positions to be tracked in the image plane, the algorithm optimizes the number of windows, and considers the application boundary of the algorithm, which can effectively reduce the amount of data to be processed and greatly improve the timeliness of real-time detection on the board without losing the calculation accuracy.
Crowdsourcing is becoming increasingly important for contemporary applications in machine learning and artificial intelligence. However, crowdsourcing systems may be susceptible to adversarial attacks where a subset o...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Crowdsourcing is becoming increasingly important for contemporary applications in machine learning and artificial intelligence. However, crowdsourcing systems may be susceptible to adversarial attacks where a subset of annotators deliberately provide erroneous responses. This paper introduces a novel algorithm for identifying adversarial attacks in crowdsourcing systems by recasting the problem as dense subgraph detection in bipartite graphs. In particular, we represent crowdsourced data as a weighted bipartite graph between workers and data points which are connected with edges whose weights are computed from annotators’ responses. The constructed bipartite graph is then analyzed with a sequential peeling algorithm to detect the dense subgraph that includes adversarial attacks. Compared to previous methods where only adversaries are detected, our proposed method can simultaneously identify adversarial annotators as well as affected data points. Preliminary results on real datasets showcase the potential of this novel approach.
The growing incidence of blindness, specifically linked to diabetic retinopathy (DR), highlights the need for expandable retina screening programs. The purpose of this work is to determine the distinction between norm...
详细信息
Driven by 5G technology, network performance and management requirements are becoming increasingly sophisticated. However, massive and complex alarm information is also coming, posing severe challenges to network oper...
详细信息
ISBN:
(数字)9798331541460
ISBN:
(纸本)9798331541477
Driven by 5G technology, network performance and management requirements are becoming increasingly sophisticated. However, massive and complex alarm information is also coming, posing severe challenges to network operation and maintenance. Accurately identifying alarm correlations and locating alarm root causes has become a core problem for operation and maintenance. In response to this challenge, this paper proposes a framework for mining and applying alarm rules based on large language models, which applies the text understanding capabilities of large language models to alarm processing and can mine uncommon alarm rules. Experimental results show that this framework significantly improves the accuracy and coverage of alarm rules, and improves the response speed and efficiency of network operation and maintenance.
Road image analysis is an important task for automatic road inventory. The determination geometric dimensions for the road and the identification road objects are subprocess of constructing a road digital image. In th...
详细信息
In recent years, the use of gene regulatory network (GRN) to guide swarm robots for target-entrapping tasks has received increasing attention. Even though many GRN-based algorithms for swarm aggregation morphogenesis ...
详细信息
暂无评论