The performance of the cloud-based systems is directly associated with the resource utilization. The maximum resource utilization indicates the high performance of cloud computing. Further, effective task scheduling i...
详细信息
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of ...
详细信息
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of life,conversational assistive technologies include speech recognition APIs,text-to-speech APIs and various communication tools that are *** real-time *** natural language processing(NLP)and machine learning algorithms,the technology analyzes spoken language and provides appropriate responses,offering an immersive experience through voice commands,audio feedback and vibration ***/methodology/approach:These technologies have demonstrated their ability to promote self-confidence and self-reliance in visually impaired individuals during social ***,they promise to improve social competence and foster better *** short,assistive technology in conversation stands as a promising tool that empowers the visually impaired individuals,elevating the quality of their social ***:The main benefit of assistive communication technology is that it will help visually impaired people overcome communication barriers in social *** technology helps them communicate effectively with acquaintances,family,co-workers and even strangers in public *** enabling smoother and more natural communication,it works to reduce feelings of isolation and increase overall quality of ***/value:Research findings include successful activity recognition,aligning with activities on which the VGG-16 model was trained,such as hugging,shaking hands,talking,walking,waving and *** originality of this study lies in its approach to address the challenges faced by the visually impaired individuals in their social interactions through modern *** adds to the body of knowledge in the area of assistive technologies,which contribute to the empowerment and social in
The detection of violence in videos has become an extremely valuable application in real-life situations, which aim to maintain and protect people’s safety. Despite the complexities inherent in videos and the abrupt ...
详细信息
In this work, VoteDroid a novel fine-tuned deep learning models-based ensemble voting classifier has been proposed for detecting malicious behavior in Android applications. To this end, we proposed adopting the random...
详细信息
Medical imaging, a cornerstone of disease diagnosis and treatment planning, faces the hurdles of subjective interpretation and reliance on specialized expertise. Deep learning algorithms show improvements in automatin...
详细信息
We studied the weekly number and the growth/decline rates of COVID-19 deaths of the period from October 31, 2022, to February 9, 2023, in Italy. We found that the COVID-19 winter wave reached its peak during the three...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrela...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrelated or the original one,when tampering has no ***,standard version of non-malleable codes provide security against one time tampering *** ciphers are successfully employed in the construction of non-malleable *** construction fails to provide security when an adversary tampers the codeword more than *** non-malleable codes further allow an attacker to tamper the message for polynomial number of *** this work,we propose continuous version of non-malleable codes from block ciphers in split-state *** construction provides security against polynomial number of tampering attacks and it preserves *** the tam-pering experiment triggers self-destruct,the security of continuously non-malleable code reduces to security of the underlying leakage resilient storage.
The missing readings in various sensors of air pollution monitoring stations is a common issue. Those missing sensor readings may greatly influence the performance of monitoring and analysis of air pollution data. To ...
详细信息
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p...
详细信息
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment planning,and outcome *** by the need for more accurate and robust segmentation methods,this study addresses key research gaps in the application of deep learning techniques to multimodal medical ***,it investigates the limitations of existing 2D and 3D models in capturing complex tumor structures and proposes an innovative 2.5D UNet Transformer model as a *** primary research questions guiding this study are:(1)How can the integration of convolutional neural networks(CNNs)and transformer networks enhance segmentation accuracy in dual PET/CT imaging?(2)What are the comparative advantages of 2D,2.5D,and 3D model configurations in this context?To answer these questions,we aimed to develop and evaluate advanced deep-learning models that leverage the strengths of both CNNs and *** proposed methodology involved a comprehensive preprocessing pipeline,including normalization,contrast enhancement,and resampling,followed by segmentation using 2D,2.5D,and 3D UNet Transformer *** models were trained and tested on three diverse datasets:HeckTor2022,AutoPET2023,and *** was assessed using metrics such as Dice Similarity Coefficient,Jaccard Index,Average Surface Distance(ASD),and Relative Absolute Volume Difference(RAVD).The findings demonstrate that the 2.5D UNet Transformer model consistently outperformed the 2D and 3D models across most metrics,achieving the highest Dice and Jaccard values,indicating superior segmentation *** instance,on the HeckTor2022 dataset,the 2.5D model achieved a Dice score of 81.777 and a Jaccard index of 0.705,surpassing other model *** 3D model showed strong boundary delineation performance but exhibited variability across datasets,while the
We propose a method to reconstruct a personalized hand avatar, representing the user's hand shape and appearance, from a monocular RGB-D video of a hand performing unknown hand poses under unknown illumination. Ou...
详细信息
暂无评论