Rapid urbanization and increasing income levels combined with poor and insufficient road network to accommodate vehicles is causing a major traffic problem in Sri Lanka. Additionally, in urban areas, traffic congestio...
详细信息
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitor...
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitoring and anti-theft alarming system with enhanced physical security mechanisms. The focus of this research was to create a holistic and secure smart home system, combining cutting-edge physical security measures. The study introduced novel Intruder Access Prevention methods rooted in human behavior and voice pattern recognition, while also incorporating blockchain and network traffic analysis to safeguard the homeowner's data. Furthermore, a pioneering voice-controlled monitoring mechanism, utilizing protective energy-saving plug technology, was devised to enhance safety within contemporary households. The human behavior recognition and voice recognition-based intruder access prevention system demonstrated over 80% accuracy in intruder prevention, while user data protection mechanism prevents the communication channel from cyber hackings. Further, the smart plug demonstrates reliable and accurate physical environment monitoring with minimum latency. These results underscore the system's significant contribution to home security, marking a noteworthy advancement in the Smart Home concept.
Point clouds from real-world scenarios inevitably contain complex noise, significantly impairing the accuracy of downstream tasks. To tackle this challenge, cascading encoder-decoder architecture has become a conventi...
详细信息
Telerehabilitation systems that support physical therapy sessions anywhere can help save healthcare costs while also improving the quality of life of the users that need rehabilitation. The main contribution of this p...
详细信息
In this paper we propose an improved recipe recommendation system that employs image recognition of food ingredients. The system is currently a mobile application that performs image recognition on uploaded or camera-...
In this paper we propose an improved recipe recommendation system that employs image recognition of food ingredients. The system is currently a mobile application that performs image recognition on uploaded or camera-captured images and recommends recipes containing the recognized ingredients. We used the ResNet-V2 architecture to build a convolutional neural network model for image recognition, which was able to identify 33 different food ingredients with an accuracy rate of 89%. The recommendation system uses the identified ingredient labels, as well as user preferences and restrictions, to display a list of recipes containing the identified ingredients. This feature allows users to discover new and exciting recipes based on the ingredients they currently have at home, without having to worry about dietary restrictions or other preferences. Overall, our system provides a convenient and personalized way for users to discover and prepare delicious meals based on their unique needs and preferences.
computer-aided detection of plasmodium malaria on cell images from digital microscopy provides an invaluable second opinion to medical experts. Traditionally, well-established deep learning algorithms are widely used ...
computer-aided detection of plasmodium malaria on cell images from digital microscopy provides an invaluable second opinion to medical experts. Traditionally, well-established deep learning algorithms are widely used to detect plasmodium, but these techniques have not been deployed due to the uninterpretable nature of the decisions made by the network. To address this, we present an ensemble method that fuses the predictions based on the class activation mapping (CAM) results from multiple networks via a novel selector network. We study the performance on a publicly available dataset of cell images by using three convolutional neural network architectures, Xception, ResNet50, and InceptionV3,to produce CAM results for the selector network and performance comparison. Our proposed approach helps enhance doctors' trust and outperforms the traditional methods by 1%.
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati...
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestation results. Talk statement has been locked in starting late to enable liberal event Recognition. This problem is not yet evident in light of the assumption that most people tend to think that they have a specific limit to the data on Twitter that have frames based on events based on Twitter. Current appraisals see new pieces by seeing and looking at the significant psychological aspects of hitting the details on Twitter. No matter, the scale of the visual cues can be well established, with the intention that it is essential to design an integrated Twitter experiment with another set of extensible data resources to rectify this problem. The problem is the processes by which you should wholeheartedly investigate all converted data because it has different data structures, transfer times, etc. This issue of address, the paper proposes a framework for evaluating the use of Twitter-based events and examines two types of data resources for the reliability of impact testing. Our framework uses the resultant of the request obtaining by various events and relevant to the articles on it. This paper has improved the cleaning test with the proposed process how the integrity estimation of twitter based event can be recognized with the help of group of analyzed data. The evaluation indicates that the proposed system provides visible high-level testing events and a variety of low-level testing events.
Functional verification of digital designs is an increasingly complex and time-consuming endeavor. One of the major challenges in functional verification is achieving functional coverage closure in a timely manner. Ve...
详细信息
The existing advanced machine learning approaches based on Graph Neural Networks (GNN) for efficient traffic engineering (TE) in software Defined Networking (SDN) overlook consideration of link reliability values. Lin...
详细信息
Natural disasters like floods have caused immense harm to lives and resources, underscoring the need for accurate prediction methods to mitigate their impact. Meteorological flood indices such as the standardized prec...
详细信息
ISBN:
(数字)9798350379990
ISBN:
(纸本)9798350391558
Natural disasters like floods have caused immense harm to lives and resources, underscoring the need for accurate prediction methods to mitigate their impact. Meteorological flood indices such as the standardized precipitation index help identify flood occurrences and severity levels, enabling proactive measures. While past research primarily used statistical methods like Least Square-Support Vector Machine (LS-SVM), these often lack accuracy for long-term forecasts. Advancements in machine learning, particularly artificial neural networks and deep neural networks, offer more accurate predictions over extended periods. Long Short-Term Memory (LSTM) models and Convolutional Neural Networks (CNN) are used to predict flood indices, handling real-time nonlinear data effectively. Benchmarking trials have shown that an LSTM and CNN configuration produced the best predictions, with an accuracy, prediction, MSE, and RMSE of 97.93,0.89, 0.01, and 0.10 respectively.
暂无评论