The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological *** to the advancements ...
详细信息
The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological *** to the advancements of medical imaging in healthcare decision making,significant attention has been paid by the computer vision and deep learning(DL)*** the same time,the detection and classification of colorectal cancer(CC)become essential to reduce the severity of the disease at an earlier *** existing methods are commonly based on the combination of textual features to examine the classifier results or machine learning(ML)to recognize the existence of *** this aspect,this study focuses on the design of intelligent DL based CC detection and classification(IDL-CCDC)model for bioinformatics *** proposed IDL-CCDC technique aims to detect and classify different classes of *** addition,the IDLCCDC technique involves fuzzy filtering technique for noise removal ***,water wave optimization(WWO)based EfficientNet model is employed for feature extraction ***,chaotic glowworm swarm optimization(CGSO)based variational auto encoder(VAE)is applied for the classification of CC into benign or *** design of WWO and CGSO algorithms helps to increase the overall classification *** performance validation of the IDL-CCDC technique takes place using benchmark Warwick-QU dataset and the results portrayed the supremacy of the IDL-CCDC technique over the recent approaches with the maximum accuracy of 0.969.
In magnetic resonant coupling (MRC) based wireless power transfer (WPT) systems, receiver (RX) feedback communication is promising to enhance the capability and efficiency of the system. Although some studies have exp...
详细信息
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre...
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre-trained CNN models are used to extract features from signature images, which are then combined with handcrafted features such as HOG and some other geometric features of signature. Such combined features are passed to bidirectional LSTM model in which drop out layer undergoes classification which differentiate real and forgery signature. The proposed system has potential applications in document authentication and security, subsequently combination of CNN models and additional features provides more comprehensive representation of signature images resulting in improved accuracy. Three signature datasets are utilized namely GDPS, CEDAR, and BHSig-Bengali each with varying signature styles and image quality. Our experimental outcomes reveal that Bidirectional Convolutional LSTM along with handcraft features attained maximum accuracy in offline signature verification system.
This work proposes a novel multi-robot task allocation framework for robots that can switch between multiple modes, e.g., flying, driving, or walking. We first provide a method to encode the multi-mode property of rob...
详细信息
The use of cutting-edge technology in the medical field results in the production of massive volumes of data on a daily basis. Various categories of information are applied in the domain of healthcare, including clini...
The use of cutting-edge technology in the medical field results in the production of massive volumes of data on a daily basis. Various categories of information are applied in the domain of healthcare, including clinic information, medical record data, and genetic information. In addition, real-time monitoring in the medical industry produces enormous volumes of data, and properly interpreting such enormous amounts of data is a significant problem. The evaluation of medical information becomes more required so that suitable drugs may be supplied and issues can be avoided by taking appropriate measures depending on the history of the patient. Automation makes data analysis more effective, but performance might deteriorate when there are problems with data integrity, diversity, or consistency. Automation makes data analysis more effective. In order to handle the management of massive amounts of data, many models that are powered by neural networks have been developed; still researchers are currently attempting to develop a superior model that is more accurate. Hence, fuzzy c denotes the process of clustering, whereas generative adversarial networks are used in this study to clusters and classify medical data, aiming to achieve the maximum degree of efficiency in classification. The experiment will use both the benchmark lung cancer sample and the arrhythmias sample. The proposed model achieves a maximum accuracy of 97.3% for dataset 1 and 98.2% for dataset 2, outperforming other methods such as support vector machine, decision tree, and random forest algorithms.
In semiconductor manufacturing, multicluster tools are widely employed for many wafer fabrication processes. With the demand for high-mix integrated circuit chips and shrinkage of circuit width, a scheme in which mult...
In semiconductor manufacturing, multicluster tools are widely employed for many wafer fabrication processes. With the demand for high-mix integrated circuit chips and shrinkage of circuit width, a scheme in which multiple wafer types are fabricated inside multicluster tools is adopted by wafer foundries to make more profits. Multiple wafer types, multiple robots, and wafer residency time constraints make the resulting scheduling problems challenging. This work focuses on scheduling a single-arm multicluster tool to process two wafer types concurrently subject to wafer residency time constraints in which a conventional one-wafer cycle and backward strategy are not efficient. With such properties, several necessary and sufficient conditions are presented to check the feasibility of a periodic schedule. Polynomial-time-complex algorithms are proposed to examine a tool's schedulability and coordinate multiple robots to handle wafers for schedulable scenarios. The cycle time of an obtained schedule can reach the lower bound. A practical example is used to show the effectiveness of the proposed algorithm.
Kidney stones are primarily crystals formed from ion oversaturation in urine. Currently, the diagnosis of kidney stones involves experienced professionals manually interpreting images of urinary crystals under a micro...
详细信息
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of ...
详细信息
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of new technology to quickly perpetrate fraud against customer transaction patterns. We analyze credit card transaction networks and identify suspicious patterns, such as transactions connected to multiple accounts or unusual transaction patterns, transactions made at unusual times, and to monitor credit card transactions in real-time and quickly identify suspicious transactions. TigerGraph is used to analyze data, display results on a dashboard, and send notifications via email. One meth’\ Vc 1``13-od commonly used in anomaly detection is to compare data values against the standard deviation. In this research, we explain the use of TigerGraph as a platform for anomaly detection above the standard deviation, as well as the use of the Louvain algorithm in finding merchant communities used by fraudsters. The data used in this study comes from Sparkov simulation data obtained from Kaggle. Our results show that by using TigerGraph, we managed to achieve a very high accuracy rate of 99.77%, precision 82.84%, recall 72.38%, and f1-score 77,26% in predicting transaction fraud on Sparkov simulation data. This is much better than the results reported in a paper that uses the supervised machine learning method with the AdaBoost algorithm which achieves the highest accuracy of 77%.
The increasing popularity of mobile devices and social networks has leads people to share images and text to express their emotions and opinions. This paper proposed a deep learning-based technique for multimodal sent...
The increasing popularity of mobile devices and social networks has leads people to share images and text to express their emotions and opinions. This paper proposed a deep learning-based technique for multimodal sentimental analysis. For this work, the CMU-MOSI and CMU-MOSEI dataset is utilized which contains video, audio and text clips. The inputs are in the form of video, audio and text, so individual preprocessing and feature extraction techniques are performed with separate techniques. Then, the extracted features from separate techniques are concatenated and given as input for the classification of sentimental analysis. The Long-Short Term Memory (LSTM) is utilized in this research for classification. The performance metrics like 7-class accuracy (Acc-7), binary accuracy (Acc-2), F1-score, Mean Absolute Error (MAE) and Correlation Coefficient (CORR) are utilized to evaluate the LSTM model. The attained result shows that the LSTM model obtains better Acc-2 of 91.57% on CMU-MOSI dataset and 91.28% of CMU-MOSEI dataset when compared to existing techniques like Multi-Tensor Fusion Network with Cross-Modal Modeling (MTFN-CMM), Sparse and Cross-Attention Network (SCANET) and Sparse and Cross-Attention Network (SCANET).
Collaborative state estimation using different heterogeneous sensors is a fundamental prerequisite for robotic swarms operating in GPS-denied environments, posing a significant research challenge. In this paper, we in...
详细信息
暂无评论