The Kingdom of Saudi Arabia is one of the world's leading fresh date producers. Identifying damaged date palm trees on the farm is important for saving water and stopping the spread of pest which has caused the da...
详细信息
This study represents a substantial advance in regard to the application of machine learning to the treatment of chronic obstructive pulmonary disease (COPD). Recurrent neural networks (RNNs) incorporating Long Short-...
详细信息
作者:
Qiu, RanZhao, ShengrongLiang, Hu
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science
Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ...
详细信息
The task of automatically analyzing sentiments from a tweet has more use now than ever due to the spectrum of emotions expressed from national leaders to the average *** this data can be critical for any *** are often...
详细信息
The task of automatically analyzing sentiments from a tweet has more use now than ever due to the spectrum of emotions expressed from national leaders to the average *** this data can be critical for any *** are often expressed with different intensity and topics which can provide great insight into how something affects *** analysis in Twittermitigates the various issues of analyzing the tweets in terms of views expressed and several approaches have already been proposed for sentiment analysis in *** used for analyzing tweet emotions are also briefly presented in literature survey *** this paper,hybrid combination of different model’s LSTM-CNN have been proposed where LSTMis Long Short TermMemory andCNNrepresents ConvolutionalNeural ***,the main contribution of our work is to compare various deep learning and machine learning models and categorization based on the techniques *** main drawback of LSTM is that it’s a timeconsuming process whereas CNN do not express content information in an accurate way,thus our proposed hybrid technique improves the precision rate and helps in achieving better *** step of our mentioned technique is to preprocess the data in order to remove stop words and unnecessary data to improve the efficiency in terms of time and accuracy also it shows optimal results when it is compared with predefined approaches.
This paper is aimed to develop an algorithm for extracting association rules,called Context-Based Association Rule Mining algorithm(CARM),which can be regarded as an extension of the Context-Based Positive and Negativ...
详细信息
This paper is aimed to develop an algorithm for extracting association rules,called Context-Based Association Rule Mining algorithm(CARM),which can be regarded as an extension of the Context-Based Positive and Negative Association Rule Mining algorithm(CBPNARM).CBPNARM was developed to extract positive and negative association rules from Spatiotemporal(space-time)data only,while the proposed algorithm can be applied to both spatial and non-spatial *** proposed algorithm is applied to the energy dataset to classify a country’s energy development by uncovering the enthralling interdependencies between the set of variables to get positive and negative *** association rules related to sustainable energy development are extracted by the proposed algorithm that needs to be pruned by some pruning *** context,in this paper serves as a pruning measure to extract pertinent association rules from non-spatial *** Probability Increment Ratio(CPIR)is also added in the proposed algorithm that was not used in *** inclusion of the context variable and CPIR resulted in fewer rules and improved robustness and ease of ***,the extraction of a common negative frequent itemset in CARM is different from that of *** rules created by the proposed algorithm are more meaningful,significant,relevant and *** accuracy of the proposed algorithm is compared with the Apriori,PNARM and CBPNARM *** results demonstrated enhanced accuracy,relevance and timeliness.
Human sign language is a visual and gestural means of communication used by people with hearing impairments to interact with others. It has the potential to enable interaction between individuals who struggle with ver...
详细信息
Human sign language is a visual and gestural means of communication used by people with hearing impairments to interact with others. It has the potential to enable interaction between individuals who struggle with verbal communication and those who lack the essential proficiency to comprehend sign language. Wh-questions constitute a substantial portion of daily sign language interactions. Automatic recognition of Wh-question words in sign language, encompassing interrogative words, has received limited attention in gesture recognition. In this context, a novel dataset named the American Question Sign Video dataset (AQSVd) has been introduced as a significant contribution. Recognizing Wh-question signs in video streams empowers individuals to effectively convey messages through hand movements and gestures, fostering inclusivity and accessibility in communication for deaf and hearing-impaired individuals. The paper proposes a Deep Convolutional-3D BiLSTM Multi-head Attention network for recognizing American Wh-Question word sign gestures in video streams. Incorporating Multi-head attention in the proposed model enhances its ability to capture intricate spatial and temporal features, essential for accurate gesture recognition. The proposed model is thoroughly evaluated across a range of datasets, such as INCLUDE50, WLASL-100, and our AQSVd dataset, achieving remarkable results. Specifically, our model demonstrated an outstanding 98.91% validation accuracy on the AQSVd dataset. The C3D-BiLSTM MHAttention model outperforms other state-of-the-art models, demonstrating its superiority in sign language recognition tasks. The proposed dataset and C3D-BiLSTM Multi-head Attention model contribute significantly to this field, offering potential benefits in education, human-robot interaction, and overall communication for the hearing-impaired community.
In the recent digital era security has become more challenging. There is a plethora of ways to find solution to ensure monitor the system and provide required security. Key logger is one of the cyber attacks which rec...
详细信息
ISBN:
(数字)9798350365337
ISBN:
(纸本)9798350365344
In the recent digital era security has become more challenging. There is a plethora of ways to find solution to ensure monitor the system and provide required security. Key logger is one of the cyber attacks which record the key strokes of the targeted systems or devices from the host person. In other words, the program retrieves vital information such as login credentials, passwords and other sensitive information. There are many types of key logger, software key loggers is one of the key logger type which use software applications to collect the information from the targeted machine to host machine. It is indeed difficult to trace the software key logger because it runs in background without any noticeable signs. However, there are some signs like network traffic and unexpected activity. This paper concentrates on the implementation of key logger and its observation using python file, JavaScript file and etc.
Typing errors are a behavior that often occurs in communication via short messages or posts on social media platforms. In communicating on social media, many individuals without realizing it often make typing errors t...
详细信息
As the installed capacity of wind turbines increases, the overall inertia of the system decreases, which reduces the ability of the system to support the frequency. Due to the tendency to operate in a maximum power tr...
详细信息
The problem of spam emails is a widespread issue that creates a lot of inconvenience for individuals and organizations. According to statistics, approximately 84% of emails received on a daily basis are recognized as ...
详细信息
暂无评论