Summarization approaches are currently proposed solutions that focus on meaningfully reducing different types of data such as text, audio, and video. Many techniques such as machine learning, signal processing, image ...
详细信息
Facial recognition is in use for the past decade there are many applications that needs facial expression to learn the human behaviour and emotions for certain activities. Facial recognition is in a development phase ...
详细信息
In the current scenario, recognizing various objects and tracking their movements in the real-time surveillance footage is the most difficult task. To detect objects, a combination of imageprocessing and computer vis...
详细信息
Alzheimer's disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diag...
详细信息
Alzheimer's disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF. machine learning algorithms namely Decision tree, XGB, and random forest are used for model building to predict Alzheimer's disease. Experiments are performed in two ways, first on the original dataset and then on class balanced datasets. As the dataset is highly imbalanced, the class imbalance problem is overcome by SMOTE technique. image
作者:
Liu, XiuAldrich, ChrisCurtin Univ
Western Australian Sch Mines Minerals Energy & Ch GPOB U1987 Perth WA 6845 Australia Univ Stellenbosch
Dept Proc Engn Private Bag 11 ZA-7602 Stellenbosch South Africa
The application of computer vision systems on industrial flotation plants has benefited considerably from advances in deep learning over the last decade, mostly based on the use of convolutional neural networks and tr...
详细信息
ISBN:
(纸本)9781713872344
The application of computer vision systems on industrial flotation plants has benefited considerably from advances in deep learning over the last decade, mostly based on the use of convolutional neural networks and transfer learning. More recently, vision transformers (viTs) have attracted strong interest since their first appearance in 2017, compared to the popular convolutional neural networks (CNNs). Although becoming well-established in many areas, they have not yet been considered meaningfully in machinevision or signal processingapplications in mineral processing, despite the obvious benefits that their application could realize. In this paper, it is demonstrated that viTs are neural network architectures highly capable of discriminating between different froth flotation images. A customized viT model and a pretrained viT model using transfer learning were studied and compared. The former achieved satisfactory performance and the latter achieved near perfect performance, both at a significantly lower computational cost than CNNs. These results suggest that viTs can be a competitive alternative to CNNs in the advancement of computer vision systems on industrial flotation plants. Copyright (c) 2023 The Authors.
Abnormal behavior identification becomes significant in real-time smart environments as the act of threats is increasing globally, nowadays. Accurate recognition of abnormal behaviors well-ensures public safety and se...
详细信息
Abnormal behavior identification becomes significant in real-time smart environments as the act of threats is increasing globally, nowadays. Accurate recognition of abnormal behaviors well-ensures public safety and security, especially in crowded scenes, but is more complicated to estimate. The closed-circuit televisions (CCTvs) installed in public places to prevent crimes demand automated behavior modeling mechanisms to detect abnormal activities. The deep learning (DL) based computer vision algorithms although performing very well, are not capable of detecting abnormal behaviors in CCTvimages in real-time due to the high computational complexity and ineffective learning behavior. To overcome this limitation, in our research, an intelligent 'Hybrid Conv_Trans-OptBiSvM' based abnormal behavior detection model is proposed. Diverse model components such as convolution backbone layer, spatial-temporal encoder and Attention in attention mechanism (A2M) are integrated for extracting complicated data patterns to identify the abnormal events in the image frames. The 2D-CNN layer extracts local and high-level features from the images. The encoder layer aims to identify global space and long-range temporal dependencies among adjacent pixels using self and cross-attention with temporal association. In addition, an A2M method assists in enhancing the quality of correlation map. It searches for correlation uniformity surrounding every key to improve the relevant correlations of corresponding key query pairs. Finally, classification is done by the designed optimized binary support vector machine (OptBiSvM). It uses particle swarm optimization (PSO) algorithm for tuning hyperparameters such as kernel parameter and cost parameter. We compare our model's performance with other algorithms to evaluate and validate its effectiveness using multiple benchmark datasets- UNM, UCSD (PED 1, PED2, and PETS 2009. The notable outcomes generated by the Hybrid Conv_Trans-OptBiSvM algorithm emph
machine learning, with its myriad applications, has become an integral component of numerous AI systems. A common practice in this domain is the use of transfer learning, where a pre-trained model's architecture, ...
详细信息
machine learning, with its myriad applications, has become an integral component of numerous AI systems. A common practice in this domain is the use of transfer learning, where a pre-trained model's architecture, readily available to the public, is fine-tuned to suit specific tasks. As machine Learning as a Service (MLaaS) platforms increasingly use pre-trained models in their backends, it is crucial to safeguard these architectures and understand their vulnerabilities. In this work, we present ArchWhisperer, a model fingerprinting attack approach based on the novel observation that the classification patterns of adversarial images can be used as a means to steal the models. Furthermore, the adversarial image classifications in conjunction with model inference times is used to further enhance our attack in terms of attack effectiveness as well as query budget. ArchWhisperer is designed for typical user-level access in remote MLaaS environments and it exploits varying misclassifications of adversarial images across different models to fingerprint several renowned Convolutional Neural Network (CNN) and vision Transformer (viT) architectures. We utilize the profiling of remote model inference times to reduce the necessary adversarial images, subsequently decreasing the number of queries required. We have presented our results over 27 pre-trained models of different CNN and viT architectures using CIFAR-10 dataset and demonstrate a high accuracy of 88.8% while keeping the query budget under 20. This is a marked improvement compared to state-of-the-art works.
The detection and morphology characterization of these biological samples are the basis of life research. Optical microscopic imaging has great advantages in the characterization and detection of biological samples be...
详细信息
The proceedings contain 76 papers. The special focus in this conference is on machinevision and Augmented Intelligence. The topics include: Survey on Robustness of Deep Learning Techniques on Adversarial Attacks in W...
ISBN:
(纸本)9789819743582
The proceedings contain 76 papers. The special focus in this conference is on machinevision and Augmented Intelligence. The topics include: Survey on Robustness of Deep Learning Techniques on Adversarial Attacks in WBAN;synergizing Collaborative and Content-Based Filtering for Enhanced Movie Recommendations;exploring Transformer-Based Approaches for Hyperspectral image Classification: A Comparative Analysis;deep Learning for Cognitive Task and Seizure Classification with Hilbert–Huang Transform and variational Mode Decomposition;tracking of Ship and Plane in Satellite videos Using a Convolutional Regression Network with Deep Features;Tumor Detection and Analysis from Brain MRI images Using Deep Learning;software Maintenance Prediction Using Stack Ensemble Deep Learning Algorithms;resource Allocation in 6G Network for High-Speed Train Using D2D Outband Communication;controlling the Band-to-Band Tunneling Effect in Charge Plasma Based Dopingless Transistor;Comparison of Different CIC Filter Architectures on the Basis of a Novel Parameter Called Noise Factor for Sigma-Delta Based ADCs;the Scientific Analysis on Effective Yoga Posture Recognition Techniques;impact of Gamma Rays on Emerging Devices for Photonic applications;shaft Rotation Monitoring Using Radar Signal processing and Wavelet Transform;gysel Power Divider Miniaturization Using an Inter-Digital Capacitor-Based Slow-Wave Structure;noise Estimation and Removal in Fundus images Using Pyramid Real image Denoising Network;evaluation of Hybrid Encryption Method to Secure Healthcare Data;multimodal Face Recognition System Using Hybrid Deep Learning Feature;Classification of Copy and Move image by Using HELM-FSK Method: An Efficient Approach;analysis of Energy Efficient Smart Home Based on IoT System;role of Explainable Artificial Intelligence Approaches in Cybersecurity.
Currently, screen content video applications are increasingly widespread in our daily lives. The latest Screen Content Coding (SCC) standard, known as versatile video Coding (vvC) SCC, employs screen content Coding Mo...
详细信息
ISBN:
(纸本)9798350349405;9798350349399
Currently, screen content video applications are increasingly widespread in our daily lives. The latest Screen Content Coding (SCC) standard, known as versatile video Coding (vvC) SCC, employs screen content Coding Modes (CMs) selection. While vvC SCC achieves high coding efficiency, its coding complexity poses a significant obstacle to the further widespread adoption of screen content video. Hence, it is crucial to enhance the coding speed of vvC SCC. In this paper, we propose a fast mode and splitting decision for Intra prediction in vvC SCC. Specifically, we initially exploit deep learning techniques to predict content types for all CUs. Subsequently, we examine CM distributions of different content types to predict candidate CMs for CUs. We then introduce early skip and early terminate CM decisions for different content types of CUs to further eliminate unlikely CMs. Finally, we develop Block-based Differential Pulse-Code Modulation (BDPCM) early termination to improve coding speed. Experimental results demonstrate that the proposed algorithm can improve coding speed by 34.95% on average while maintaining almost the same coding efficiency.
暂无评论