Power distribution and transmission depend heavily on transformers. Transformers encounter a variety of problems, including low voltage power, power loss, power wastage, power theft, phase-to-phase faults, overloading...
详细信息
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking c...
详细信息
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among *** paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics *** describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying *** use forensics techniques,Machine Learning(ML),and Deep Learning(DL)algorithms to exploit suspicious patterns to help the forensics investigation where every evidence contributes to the *** on a real-time dataset reveal better results for the detection of cyberbullying *** Random Forest in ML approach produces 87%of accuracy without SMOTE technique,whereas the value of F1Score produces a good result with SMOTE *** LSTM has 92%of validation accuracy in the DL algorithm compared with Dense and BiLSTM algorithms.
Before earlier, the primary reason why academics were interested in human observations from books was so they could quickly identify human cognition. Conversely, these signals from linguistic processing can also help ...
详细信息
Multimodal hateful content detection is a challenging task that requires complex reasoning across visual and textual modalities. Therefore, creating a meaningful multimodal representation that effectively captures the...
A significant factor in data transfer is computerscience. Security considerations make it difficult to transmit sensitive data or have conversations via the internet. Typically, cryptography is used to transmit text-...
详细信息
In the realm of disaster response, the integration of Internet of Things (IoT) technologies has paved the way for innovative solutions to enhance human detection and rescue operations. This research work introduces a ...
详细信息
The field of sentiment mining, also known as sentiment analysis and sentiment extraction, has shown a surge with diverse applications. Various approaches to automate the process of sentiment analysis have been introdu...
详细信息
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study prop...
详细信息
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study proposes a novel end-to-end disparity estimation model to address these *** approach combines a Pseudo-Siamese neural network architecture with pyramid dilated convolutions,integrating multi-scale image information to enhance robustness against lighting *** study introduces a Pseudo-Siamese structure-based disparity regression model that simplifies left-right image comparison,improving accuracy and *** model was evaluated using a dataset of stereo endoscopic videos captured by the Da Vinci surgical robot,comprising simulated silicone heart sequences and real heart video *** results demonstrate significant improvement in the network’s resistance to lighting interference without substantially increasing ***,the model exhibited faster convergence during training,contributing to overall performance *** study advances endoscopic image processing accuracy and has potential implications for surgical robot applications in complex environments.
Manufacturers must be able to figure out the most suitable technique capable of generating rapid and accurate performance when developing a precise modelling approach for the development of an efficient machining proc...
详细信息
With the wide spread of Internet of Things (loT) devices, edge computing plays a decisive part in meeting the computational demands of loT applications. Efficient resource allocation in such networks is essential to e...
详细信息
暂无评论