Employees' performance has a crucial role in running a company. thus, any efforts that aim to improve employee's performance is vital to be conducted and evaluated. thus, the purpose of writing this paper is t...
详细信息
In the realm of automated document information extraction, Object Detection and Optical Character Recognition (OCR) approaches signify a pivotal leap forward. these advancements use machine learning and computer visio...
详细信息
ISBN:
(数字)9798350353853
ISBN:
(纸本)9798350353860
In the realm of automated document information extraction, Object Detection and Optical Character Recognition (OCR) approaches signify a pivotal leap forward. these advancements use machine learning and computer vision to quickly and precisely extract important data from a variety of document formats, including road tax and Malaysian driving license. Object Detection algorithms, withthe help of platforms like Roboflow, can identify and localize key elements within documents, simplifying the dataset creation process for further analysis. Meanwhile, OCR technologies, such as Google Vision API, facilitate text and data extraction from images or scanned documents. this combination allows organizations to streamline document handling, eliminate manual processes, and reduce human errors associated with traditional data input methods. Moreover, sophisticated image classification techniques enhance document processing capabilities by improving the accuracy and reliability of extracted information. this integrated approach not only optimizes document management workflows but also sets the stage for developing advanced autonomous and assisted document technologies. As automated driving systems evolve, the seamless integration of Object Detection and OCR has the potential to revolutionize document handling through automated workflows and precise data extraction.
this paper describes a design of a lightweight authentication solution for the 6LoWPAN based Wireless Sensor Network. 6LoWPAN nodes are classified as constrained devices with limited memory and computing power. theref...
详细信息
Presents the introductory welcome message from the conferenceproceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conferenceproceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
the proceedings contain 37 papers. the topics discussed include: machine learning prediction of TBI from mobility, gait and balance patterns;improve image-based skin cancer diagnosis with generative self-supervised le...
ISBN:
(纸本)9781665439657
the proceedings contain 37 papers. the topics discussed include: machine learning prediction of TBI from mobility, gait and balance patterns;improve image-based skin cancer diagnosis with generative self-supervised learning;RT-ACL: identification of high-risk youth patients and their most significant risk factors to reduce anterior cruciate ligament reinjury risk;detection and analysis of interrupted behaviors by public policy interventions during COVID-19;information extraction from patient care reports for intelligent emergency medical services;high-confidence data programming for evaluating suppression of physiological alarms;EDA-based data stream pattern analysis and peak detection algorithm for substance users;and sensor-based human activity recognition for elderly in-patients with a Luong self-attention network.
Financial institutions face increasing challenges regarding credit card fraud incidents because fraud data lacks balance between legitimate and fraudulent transactions. the unbalanced nature of fraud data poses challe...
详细信息
ISBN:
(数字)9798331533038
ISBN:
(纸本)9798331533045
Financial institutions face increasing challenges regarding credit card fraud incidents because fraud data lacks balance between legitimate and fraudulent transactions. the unbalanced nature of fraud data poses challenges to detection methods because it remains difficult to identify fraud successfully. this research examines different sampling approaches which will enhance model efficiency in identifying fraudulent activities. the research examines two individual methods-Random Undersampling (RUS) and Synthetic Minority Oversampling Technique (SMOTE)-alongside three hybrid approaches, including RUS + Random Oversampling (ROS), RUS + SMOTE, and RUS + SMOTE Tomek, to determine the optimal strategy for enhancing detection accuracy. Several machine learning models, including Random Forest, Logistic Regression, XGBoost, AdaBoost, LightGBM, and Neural Networks, were evaluated, with a specific focus on the impact of hyperparameter optimization in boosting model efficiency. Comparative analysis revealed the superiority of hybrid sampling techniques, particularly RUS + SMOTE, in reducing false positives and negatives. LightGBM exhibited the best performance, achieving a Matthews Correlation Coefficient (MCC) of $\mathbf{0. 8 5}$, underscoring its effectiveness in fraud detection tasks. this research provides valuable insights for enhancing fraud detection systems and offers recommendations for future improvements in sampling strategies and model optimization.
Automated vehicles must perceive their environment and accordingly plan a safe trajectory to navigate. Camera sensors and image processing algorithms have been extensively used to detect free-space, which is an unoccu...
详细信息
ISBN:
(纸本)9789897584190
Automated vehicles must perceive their environment and accordingly plan a safe trajectory to navigate. Camera sensors and image processing algorithms have been extensively used to detect free-space, which is an unoccupied area where a car can safely drive through. To reduce the effort and costs of real test drives, simulation has been increasingly used in the automotive industry to test such systems. In this work, an algorithm for free-space detection is evaluated across real and virtual domains under different environment conditions: daytime, night time and fog. For this purpose, an algorithm is implemented to ease the process of creating ground-truth data for this kind of test. Based on the evaluation of predictions against ground-truth, the test results from the real test scenario are compared with its corresponding virtual twin to analyze the validity of simulation-based testing of a free-space detection algorithm.
the proceedings contain 367 papers. the topics discussed include: shared dock-less vehicle location distribution dataset visualizer;fostering inclusive education through universal instructional design;determinants of ...
ISBN:
(纸本)9789895465910
the proceedings contain 367 papers. the topics discussed include: shared dock-less vehicle location distribution dataset visualizer;fostering inclusive education through universal instructional design;determinants of e-voting acceptance in Chile: an approach based on the UTAUT model;the role of marketing in the development of digital touchpoints;physical unclonable functions based hardware obfuscation techniques: a state of the art;web accessibility on online platforms for the tourism sector in Portugal;world-class universities, a dynamic multivariate analysis through international rankings;UNAME tool: automatic generation of computer resources monitoring scripts;agile governance guidelines for software development SMEs;on the evaluation of machine learning algorithms for hyperspectral image classification on a heterogeneous computing device;partitional clustering based on PCA method for segmentation of products;and nice payer - a software platform for registering debtors with past due debts.
the proceedings contain 22 papers. the special focus in this conference is on Tools and algorithms for the Construction and Analysis of systemsconference series. the topics include: Shepherding hordes of markov chain...
ISBN:
(纸本)9783030174644
the proceedings contain 22 papers. the special focus in this conference is on Tools and algorithms for the Construction and Analysis of systemsconference series. the topics include: Shepherding hordes of markov chains;optimal time-bounded reachability analysis for concurrent systems;minimal-time synthesis for parametric timed automata;Environmentally-Friendly GR(1) Synthesis;stocHy: Automated Verification and Synthesis of Stochastic Processes;synthesis of symbolic controllers: A parallelized and sparsity-aware approach;iRank: A variable order metric for deds subject to linear invariants;binary decision diagrams with edge-specified reductions;effective entailment checking for separation logic with inductive definitions;Digital Bifurcation Analysis of TCP Dynamics;the mCRL2 Toolset for Analysing Concurrent systems: Improvements in Expressivity and Usability;verifying safety of synchronous fault-tolerant algorithms by bounded model checking;measuring masking fault-tolerance;PhASAR: An Inter-procedural Static Analysis Framework for C/C++;automatic analysis of consistency properties of distributed transaction systems in maude;multi-core On-the-Fly Saturation;Specification and efficient monitoring beyond STL;VyPR2: A framework for runtime verification of python web services;constraint-Based Monitoring of Hyperproperties;tail probabilities for randomized program runtimes via martingales for higher moments;computingthe expected execution time of probabilistic workflow nets.
Given a boolean predicate Π on labeled networks (e.g., proper coloring, leader election, etc.), a self-stabilizing algorithm for Π is a distributed algorithm that can start from any initial configuration of the netw...
详细信息
暂无评论