Automatic detection of Leukemia or blood cancer is one of the most challenging tasks that need to be addressed in the healthcare *** of white blood cells(WBCs)in the blood or bone marrow microscopic slide images play ...
详细信息
Automatic detection of Leukemia or blood cancer is one of the most challenging tasks that need to be addressed in the healthcare *** of white blood cells(WBCs)in the blood or bone marrow microscopic slide images play a crucial part in early identification to facilitate medical *** Acute Lymphocytic Leukemia(ALL),the most preferred part of the blood or marrow is to be analyzed by the experts before it spreads in the whole body and the condition becomes *** researchers have done a lot of work in this field,to demonstrate a comprehensive analysis few literature reviews have been published focusing on various artificial intelligence-based techniques like machine and deep learning detection of *** systematic review has been done in this article under the PRISMA guidelines which presents the most recent advancements in this *** image segmentation techniques were broadly studied and categorized from various online databases like Google Scholar,Science Direct,and PubMed as image processing-based,traditional machine and deep learning-based,and advanced deep learning-based models were *** Neural Networks(CNN)based on traditional models and then the recent advancements in CNN used for the classification of ALL into its subtypes.A critical analysis of the existing methods is provided to offer clarity on the current state of the ***,the paper concludes with insights and suggestions for future research,aiming to guide new researchers in the development of advanced automated systems for detecting life-threatening diseases.
Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting *** security concerns are still a substantial concern despite its extraordinary *** paper offers an extensive revi...
详细信息
Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting *** security concerns are still a substantial concern despite its extraordinary *** paper offers an extensive review of IoT security,emphasizing the technology’s architecture,important security elements,and common *** highlights how important artificial intelligence(AI)is to bolstering IoT security,especially when it comes to addressing risks at different IoT architecture *** systematically examined current mitigation strategies and their effectiveness,highlighting contemporary challenges with practical solutions and case studies from a range of industries,such as healthcare,smart homes,and industrial *** results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational *** networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning *** study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT,security challenges,and AI-driven solutions.
Digital compute-in-memory (DCIM) architectures are becoming crucial for real-time and accurate deep neural network (DNN) inference due to their capacity for precise computations. However, traditional DCIM systems ofte...
详细信息
One of the internationally known oldest script is Brahmi whose digitisation may be helpful for the archaeologists as well as it may help in the digitisation of other languages. Optical character recognition techniques...
详细信息
This project looks into the possibility of applying machine learning to optimize wireless networks for adaptive communication. Using 5G resource data, it applies preprocessing, exploratory analysis, and visualization ...
详细信息
This paper presents a hybrid precision network that combines binary and multi-bit layers for efficient 3D hand pose estimation on resource-constrained devices. By transforming the state-of-the-art HandFoldingNet (HFN)...
详细信息
Object detection plays a crucial role in the field of computer vision by autonomously locating and identifying objects of interest. The You Only Look Once (YOLO) model is an effective single-shot detector. However, YO...
详细信息
The increasing proliferation of third-generation semiconductor silicon carbide (SiC) products has led to the emergence of SiC powder as an industrial byproduct. To reutilize the SiC efficiently, we propose a facile me...
详细信息
Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones,computers,or *** can occur through various channels,such as social media,text messages,online forum...
详细信息
Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones,computers,or *** can occur through various channels,such as social media,text messages,online forums,or gaming *** involves using technology to intentionally harm,harass,or intimidate others and may take different forms,including exclusion,doxing,impersonation,harassment,and ***,due to the rapid growth of malicious internet users,this social phenomenon is becoming more frequent,and there is a huge need to address this ***,the main goal of the research proposed in this manuscript is to tackle this emerging challenge.A dataset of sexist harassment on Twitter,containing tweets about the harassment of people on a sexual basis,for natural language processing(NLP),is used for this *** algorithms are used to transform the text into a meaningful representation of numbers for machine learning(ML)input:Term frequency inverse document frequency(TF-IDF)and Bidirectional encoder representations from transformers(BERT).The well-known eXtreme gradient boosting(XGBoost)ML model is employed to classify whether certain tweets fall into the category of sexual-based harassment or ***,with the goal of reaching better performance,several XGBoost models were devised conducting hyperparameter tuning by *** this purpose,the recently emerging Coyote optimization algorithm(COA)was modified and adjusted to optimize the XGBoost ***,other cutting-edge metaheuristics approach for this challenge were also implemented,and rigid comparative analysis of the captured classification metrics(accuracy,Cohen kappa score,precision,recall,and F1-score)was ***,the best-generated model was interpreted by Shapley additive explanations(SHAP),and useful insights were gained about the behavioral patterns of people who perform social harassment.
Despite the fact that adversarial training provides an effective protection against adversarial attacks, it suffers from a huge computational overhead. To mitigate the overhead, we propose DBAC, a fast adversarial tra...
ISBN:
(纸本)9798350323481
Despite the fact that adversarial training provides an effective protection against adversarial attacks, it suffers from a huge computational overhead. To mitigate the overhead, we propose DBAC, a fast adversarial training with dynamic batch-level attack control. Based on a prior study where attack strength should gradually grow throughout the training, we control the number of samples attacked per batch for better throughput. Additionally, we collect samples from multiple batches to form a pseudo-batch and attack them simultaneously for higher GPU utilization. We implement DBAC using PyTorch to show its superior throughput with similar robust accuracy compared to the prior art.
暂无评论