With the development of ICT and its adoption in various domains, it gained remarkable intention in the healthcare sector which introduce the telemedicine term. The coronavirus pandemic has created several challenges f...
详细信息
ISBN:
(数字)9798350320244
ISBN:
(纸本)9798350320251
With the development of ICT and its adoption in various domains, it gained remarkable intention in the healthcare sector which introduce the telemedicine term. The coronavirus pandemic has created several challenges for researchers to develop an accurate and fast detection system. In this paper, we present a new telemedicine application to predict Covid-19 using CNN and Fuzzy set techniques. The evaluation of the system indicates high performance with a 98% F1 score, 99% of recall, 98% for precision, and 97% of accuracy.
A comprehensive view of factors associated with AD/ADRD will significantly aid in studies to develop new treatments for AD/ADRD and identify high-risk populations and patients for prevention efforts. In our study, we ...
详细信息
In a network topology $G$ , we say a set of st-paths are disaster-disjoint if no disaster strikes more than one path. In this poster, we explore the basic capabilities and limitations of greedy and more advanced algo...
详细信息
ISBN:
(数字)9798350384475
ISBN:
(纸本)9798350384482
In a network topology
$G$
, we say a set of st-paths are disaster-disjoint if no disaster strikes more than one path. In this poster, we explore the basic capabilities and limitations of greedy and more advanced algorithms for computing maximal collections of such paths in planar networks. An algorithm is greedy if it generates consecutive paths
$P_{1}, P_{2},\ldots$
according to a simple rule. In the simplest setting, the only rule is that
$P_{i+1}$
is the closest clockwise disaster-disjoint from
$P_{i}$
. We find that the simplest greedy may fail even when 1)
$G$
is planar, 2) each disaster region is connected, and 3) each node failure (apart from s and
$t$
) is considered possible. Adding a simple rule explained in [1] yields a correct polynomial-time algorithm for the above problem. Finally, we digest a recent related near-linear runtime algorithm of [2] solving a more general problem and discuss the underlying relations among the foundations of these algorithms.
This paper addresses the robustness of a network to sustain its connectivity and controllability against malicious attacks. This kind of network robustness is typically measured by the time-consuming attack simulation...
详细信息
Active Speaker Detection (ASD) is a process that predicts who the speaker is amongst those whose faces appear in a video (if any) at any given point in time within the recorded video. This work presents a novel algori...
详细信息
Active Speaker Detection (ASD) is a process that predicts who the speaker is amongst those whose faces appear in a video (if any) at any given point in time within the recorded video. This work presents a novel algorithm capable of detecting the active speakers in each video using the standard deviations of Color Histograms (CHs) computed at the mouth region from one frame to another. This paper relies on the assumption that the lips of an active speaker are in motion. They open and close and thus reveal the inner parts of the mouth, like the tongue, teeth, and the vocal cavity which are of diverse colors in the process of talking. It is possible to use already existing algorithms to detect the mouth region. This region can be analyzed during the speaking process for the changes in color activity, and this can be used to predict whether a user is speaking or not. If a person is not speaking, the lips are at rest the CH of such mouth regions such candidates would be stable. As a result, the standard deviations of such regions would be negligible. A threshold can be experimentally determined which is thus capable of predicting if a person is speaking or otherwise. This paper explores 53 online videos from Channels TV station, these videos were employed in the creation of 250 video clips. Each clip is between 15 to 60 seconds with a total of 3.6 hours. Each video contained the faces of at most two speakers in no particular order. Sometimes, only one of the speakers' faces appears, at other times both appear in the duration of the video. The status of the speakers whether active or not was manually labeled to be used for the performance evaluation of the proposed algorithm. This method was able to predict the active speakers with an accuracy of 99.19%.
Fact verification has attracted a lot of attention in the machine learning and natural language processing communities, as it is one of the key methods for detecting misinformation. Existing large-scale benchmarks for...
详细信息
We report the first hybrid matter-photon implementation of verifiable blind quantum computing. We use a trapped-ion quantum server and a client-side photonic detection system networked via a fiber-optic quantum link. ...
详细信息
We report the first hybrid matter-photon implementation of verifiable blind quantum computing. We use a trapped-ion quantum server and a client-side photonic detection system networked via a fiber-optic quantum link. The availability of memory qubits and deterministic entangling gates enables interactive protocols without postselection—key requirements for any scalable blind server, which previous realizations could not provide. We quantify the privacy at ≲0.03 leaked classical bits per qubit. This experiment demonstrates a path to fully verified quantum computing in the cloud.
Sign language recognition is an image-based recognition approach that uses hand gestures, and individuals all around the world have created various sign languages one of the non-verbal communication methods used in Si...
Sign language recognition is an image-based recognition approach that uses hand gestures, and individuals all around the world have created various sign languages one of the non-verbal communication methods used in Sign language is the hand gesture. This is how deaf-mute people who have hearing and speech problems communicate with one another and with non-deaf people. This is an optical communication language due to its distinctive syntax. The major goal of this article is to break down the barrier in the conversation between deaf-mute people and normal people, with an emphasis on increasing communication for physically challenged persons (Deaf and Dumb people) and teaching normal people to recognize deaf-mute people’s sign language.
Data augmentation is commonly applied to improve performance of deep learning by enforcing the knowledge that certain transformations on the input preserve the output. Currently, the data augmentation parameters are c...
详细信息
LiDAR-camera extrinsic calibration (LCEC) is the core for data fusion in computer vision. Existing methods typically rely on customized calibration targets or fixed scene types, lacking the flexibility to handle varia...
详细信息
暂无评论