A Sentiment analysis on social networks has become an increasingly important research field in recent years, driven by the rapid growth of social media and the vast amount of user-generated data. Understanding online ...
详细信息
Depression is a mental psychological disorder that may cause a physical disorder or lead to *** is highly impactful on the socialeconomical life of a person;therefore,its effective and timely detection is *** speech a...
详细信息
Depression is a mental psychological disorder that may cause a physical disorder or lead to *** is highly impactful on the socialeconomical life of a person;therefore,its effective and timely detection is *** speech and gait,facial expressions have valuable clues to *** study proposes a depression detection system based on facial expression *** features have been used for depression detection using Support Vector Machine(SVM)and Convolutional Neural Network(CNN).We extracted micro-expressions using Facial Action Coding System(FACS)as Action Units(AUs)correlated with the sad,disgust,and contempt features for depression detection.A CNN-based model is also proposed in this study to auto classify depressed subjects from images or videos in *** have been performed on the dataset obtained from Bahawal Victoria Hospital,Bahawalpur,Pakistan,as per the patient health questionnaire depression scale(PHQ-8);for inferring the mental condition of a *** experiments revealed 99.9%validation accuracy on the proposed CNN model,while extracted features obtained 100%accuracy on ***,the results proved the superiority of the reported approach over state-of-the-art methods.
The rapid dissemination of information across social networks, online news portals, and digital platforms has given rise to a pervasive issue - fake news. This misinformation, deliberately propagated by groups with ul...
详细信息
As society progresses, liquid identification plays an increasingly important role in human life. But for now, minority of existing liquid identification solutions on the market can meet daily requirements of being ubi...
详细信息
Given the damping factor α and precision tolerance ϵ, Andersen et al. [2] introduced Approximate Personalized PageRank (APPR), the de facto local method for approximating the PPR vector, with runtime bounded by Θ(1/...
Deep learning methods have demonstrated success in diagnosis prediction on Electronic Health Records (EHRs). Early attempts utilize sequential models to encode patient historical records, but they lack the ability to ...
详细信息
Evaluating reliability of software is hot concern for decision makers and software engineers seeing as if we assess, it cannot be mastered. It is common that reliability of system stratum could be employed for evaluat...
详细信息
In response to problems in the centralized storage of personal resumes on third-party recruitment platforms,such as inadequate privacy protection,inability of individuals to accurately authorize downloads,and inabilit...
详细信息
In response to problems in the centralized storage of personal resumes on third-party recruitment platforms,such as inadequate privacy protection,inability of individuals to accurately authorize downloads,and inability to determine who downloaded the resume and when,this study proposes a blockchain-based framework for secure storage and sharing of *** can employ an authorized access mechanism to protect their privacy *** proposed framework uses smart contracts,interplanetary file system,symmetric encryption,and digital signatures to protect,verify,and share *** keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these *** key escrow incentives are implemented using smart contracts to automatically verify the correctness of keys and encourage the active participation of honest key escrow *** framework combines blockchain and searchable symmetric encryption technology to realize multikeyword search using inverted indexing and Bloom filters and verify search results on the *** search service fees are charged through *** after the search results are verified can the search service provider obtain the search fee,thus ensuring fair and efficient search for encrypted *** framework is decentralized,secure,and tamper-evident,and achieves controlled sharing while protecting personal privacy and information security.
This paper considers the problem of constructing finite-dimensional state space realizations for stochastic processes that can be represented as the outputs of a certain type of a causal system driven by a continuous ...
详细信息
As technology continues to grow and becomes increasingly integral to education, institutions and universities worldwide are making substantial investments in e-learning platforms to help and enhance their students'...
详细信息
暂无评论