Image inpainting has made great achievements recently, but it is often tough to generate a semantically consistent image when faced with large missing areas in complex scenes. To address semantic and structural alignm...
详细信息
Heads-up computing aims to provide synergistic digital assistance that minimally interferes with users' on-the-go daily activities. Currently, the input modalities of heads-up computing are mainly voice and finger...
详细信息
The Nong Han Chaloem Phrakiat Lotus Park is a tourist attraction and a source of learning regarding lotus ***,as a training area,it lacks appeal and learning motivation due to its conventional presentation of informat...
详细信息
The Nong Han Chaloem Phrakiat Lotus Park is a tourist attraction and a source of learning regarding lotus ***,as a training area,it lacks appeal and learning motivation due to its conventional presentation of information regarding lotus *** current study introduced the concept of smart learning in this setting to increase interest and motivation for *** neural networks(CNNs)were used for the classification of lotus plant species,for use in the development of a mobile application to display details about each *** scope of the study was to classify 11 species of lotus plants using the proposed CNN model based on different techniques(augmentation,dropout,and L2)and hyper parameters(dropout and epoch number).The expected outcome was to obtain a high-performance CNN model with reduced total parameters compared to using three different pre-trained CNN models(Inception V3,VGG16,and VGG19)as *** performance of the model was presented in terms of accuracy,F1-score,precision,and recall *** results showed that the CNN model with the augmentation,dropout,and L2 techniques at a dropout value of 0.4 and an epoch number of 30 provided the highest testing accuracy of *** best proposed model was more accurate than the pre-trained CNN models,especially compared to Inception *** addition,the number of total parameters was reduced by approximately 1.80–2.19 *** findings demonstrated that the proposed model with a small number of total parameters had a satisfactory degree of classification accuracy.
In this paper, we delve into the transformative landscape of education amidst the disruptive advances of generative AI (GenAI), characterized by an unprecedented capacity to generate new information with tools such as...
详细信息
Agriculture is the major source of food and significantly contributes to Indian employment, and the economy is intricately tied to the outcomes of crop management, where the final yield and market prices play crucial ...
详细信息
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)*** the emergence of IoT...
详细信息
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)*** the emergence of IoT-based services,the industry of internet-based devices has *** number of these devices has raised from millions to billions,and it is expected to increase further in the near ***,additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user *** data aggregation models for Fog enabled IoT environ-ments possess high computational complexity and communication ***-fore,in order to resolve the issues and improve the lifetime of the network,this study develops an effective hierarchical data aggregation with chaotic barnacles mating optimizer(HDAG-CBMO)*** HDAG-CBMO technique derives afitness function from many relational matrices,like residual energy,average distance to neighbors,and centroid degree of target ***,a chaotic theory based population initialization technique is derived for the optimal initial position of ***,a learning based data offloading method has been developed for reducing the response time to IoT user requests.A wide range of simulation analyses demonstrated that the HDAG-CBMO technique has resulted in balanced energy utilization and prolonged lifetime of the Fog assisted IoT networks.
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to t...
详细信息
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to the data. Nowadays most of the hospitals use electronic methods to store and transmit data with basic security measures, but these methods are still vulnerable. There is no perfect solution that solves the security problems in any industry, especially healthcare. So, to cope with the arising need to increase the security of the data from being manipulated the proposed method uses a hybrid image encryption technique to hide the data in an image so it becomes difficult to sense the presence of data in the image while transmission. It combines Least Significant Bit (LSB) Algorithm using Arithmetic Division Operation along with Canny edge detection to embed the patient data in medical images. The image is subsequently encrypted using keys of six different chaotic maps sequentially to increase the integrity and robustness of the system. Finally, an encrypted image is converted into DNA sequence using DNA encoding rule to improve reliability. The experimentation is done on the Chest XRay image, Knee Magnetic Resonance Imaging (MRI) image, Neck MRI image, Lungs Computed Tomography (CT) Scan image datasets and patient medical data with 500 characters, 1000 characters and 1500 characters. And, it is evaluated based on time coefficient of encryption and decryption, histogram, entropy, similarity score (Mean Square Error), quality score (peak signal-to-noise ratio), motion activity index (number of changing pixel rate), unified average changing intensity, image similarity score (structure similarity index measurement) between original and encrypted images. Also, the proposed technique is compared with other recent state of arts methods for 500 characters embedding and performed better than those techniques. The proposed method is more stable and embeds comparativel
The Computational Visual Media(CVM)conference series is intended to provide a prominent international forum for exchanging innovative research ideas and significant computational methodologies that either underpin or ...
详细信息
The Computational Visual Media(CVM)conference series is intended to provide a prominent international forum for exchanging innovative research ideas and significant computational methodologies that either underpin or apply visual media.
Clustering strategies for reducing the energy consumption and extending the network life have been employed widely in Wireless Sensor Network (WSN). The clustering mechanism can extend the network’s service life and ...
详细信息
Cervical cancer remains the top killer of women at a young age in the world, 85% of cases are detected in low-income countries. Preventive measures and therapeutic response are enhanced if potential hazards are identi...
详细信息
暂无评论