Profanity detection has become increasingly important in various industries, including media and online content moderation. In this paper, we propose a novel approach to identifying profane words from audio using natu...
详细信息
Melanoma is a skin disease with high mortality rate while earlydiagnoses of the disease can increase the survival chances of patients. Itis challenging to automatically diagnose melanoma from dermoscopic skinsamples. ...
详细信息
Melanoma is a skin disease with high mortality rate while earlydiagnoses of the disease can increase the survival chances of patients. Itis challenging to automatically diagnose melanoma from dermoscopic skinsamples. computer-Aided Diagnostic (CAD) tool saves time and effort indiagnosing melanoma compared to existing medical approaches. In this background,there is a need exists to design an automated classification modelfor melanoma that can utilize deep and rich feature datasets of an imagefor disease classification. The current study develops an Intelligent ArithmeticOptimization with Ensemble Deep Transfer Learning Based MelanomaClassification (IAOEDTT-MC) model. The proposed IAOEDTT-MC modelfocuses on identification and classification of melanoma from dermoscopicimages. To accomplish this, IAOEDTT-MC model applies image preprocessingat the initial stage in which Gabor Filtering (GF) technique is *** addition, U-Net segmentation approach is employed to segment the lesionregions in dermoscopic images. Besides, an ensemble of DL models includingResNet50 and ElasticNet models is applied in this study. Moreover, AOalgorithm with Gated Recurrent Unit (GRU) method is utilized for identificationand classification of melanoma. The proposed IAOEDTT-MC methodwas experimentally validated with the help of benchmark datasets and theproposed model attained maximum accuracy of 92.09% on ISIC 2017 dataset.
Healthcare, the smart grid, and supply chain management are some of the industries where IoT(Internet of Things) technology is improving. Also, it improves the way humans communicate with each other, the atmosphere, a...
详细信息
This study investigates barely-supervised medical image segmentation where only few labeled data, i.e., single-digit cases are available. We observe the key limitation of the existing state-of-the-art semi-supervised ...
详细信息
Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio...
详细信息
Scanning microscopy systems, such as confocal and multiphoton microscopy, are powerful imaging tools for probing deep into biological tissue. However, scanning systems have an inherent trade-off between acquisition ti...
详细信息
This research analyzes the usefulness of YOLOv8 for robust pedestrian recognition in demanding real world situations. A custom-trained YOLOv8 model is evaluated against SSD models, displaying better accuracy in detect...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly employed to prevent *** systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate *** have been made in the past to detect new attacks using machine learning and deep learning techniques,however,these efforts have been *** this paper,we propose two deep learning models to automatically detect various types of intrusion attacks in IoT ***,we experimentally evaluate the use of two Convolutional Neural Networks(CNN)to detect nine distinct types of attacks listed in the NF-UNSW-NB15-v2 *** accomplish this goal,the network stream data were initially converted to twodimensional images,which were then used to train the neural network *** also propose two baseline models to demonstrate the performance of the proposed ***,both models achieve high accuracy in detecting the majority of these nine attacks.
Maximizing influence propagation in modern social networks is essential for applications like viral marketing, information diffusion, and network resilience. Traditional methods, like centrality-based metrics and comm...
详细信息
Visually impaired people are socially disconnected in situations like face-to-face communication and recognize known individuals. Engaging freely with their sighted counterparts is still challenging and adequate atten...
详细信息
暂无评论