A thin shell model refers to a surface or structure,where the object’s thickness is considered *** the context of 3D printing,thin shell models are characterized by having lightweight,hollow structures,and reduced ma...
详细信息
A thin shell model refers to a surface or structure,where the object’s thickness is considered *** the context of 3D printing,thin shell models are characterized by having lightweight,hollow structures,and reduced material *** versatility and visual appeal make them popular in various fields,such as cloth simulation,character skinning,and for thin-walled structures like leaves,paper,or metal ***,optimization of thin shell models without external support remains a challenge due to their minimal interior operational *** the same reasons,hollowing methods are also unsuitable for this *** fact,thin shell modulation methods are required to preserve the visual appearance of a two-sided surface which further constrain the problem *** this paper,we introduce a new visual disparity metric tailored for shell models,integrating local details and global shape attributes in terms of visual *** method modulates thin shell models using global deformations and local thickening while accounting for visual saliency,stability,and structural ***,thin shell models such as bas-reliefs,hollow shapes,and cloth can be stabilized to stand in arbitrary orientations,making them ideal for 3D printing.
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature...
详细信息
Modern apps require high computing resources for real-time data processing, allowing app users (AUs) to access real-time information. Edge computing (EC) provides dynamic computing resources to AUs for real-time data ...
详细信息
Modern apps require high computing resources for real-time data processing, allowing app users (AUs) to access real-time information. Edge computing (EC) provides dynamic computing resources to AUs for real-time data processing. However, due to resources and coverage constraints, edge servers (ESs) in specific areas can only serve a limited number of AUs. Hence, the app user allocation problem (AUAP) becomes challenging in the EC environment. This paper proposes a quantum-inspired differential evolution algorithm (QDE-UA) for efficient user allocation in the EC environment. The quantum vector is designed to provide a complete solution to the AUAP. The fitness function considers the minimum use of ES, user allocation rate (UAR), energy consumption, and load balance. Extensive simulations and hypotheses-based statistical analyses (ANOVA, Friedman test) are performed to show the significance of the proposed QDE-UA. The results indicate that QDE-UA outperforms the majority of the existing strategies with an average UAR improvement of 112.42%, and 140.62% enhancement in load balance while utilizing 13.98% fewer ESs. Due to the higher UAR, QDE-UA shows 59.28% higher total energy consumption on average. However, the lower energy consumption per AU is evidence of its energy efficiency. IEEE
Parkinson’s disease(PD)is a chronic neurological condition that progresses over *** start to have trouble speaking,writing,walking,or performing other basic skills as dopamine-generating neurons in some brain regions...
详细信息
Parkinson’s disease(PD)is a chronic neurological condition that progresses over *** start to have trouble speaking,writing,walking,or performing other basic skills as dopamine-generating neurons in some brain regions are injured or *** patient’s symptoms become more severe due to the worsening of their signs over *** this study,we applied state-of-the-art machine learning algorithms to diagnose Parkinson’s disease and identify related risk *** research worked on the publicly available dataset on PD,and the dataset consists of a set of significant characteristics of *** aim to apply soft computing techniques and provide an effective solution for medical professionals to diagnose PD *** research methodology involves developing a model using a machine learning *** the model selection,eight different machine learning techniques were adopted:Namely,Random Forest(RF),Decision Tree(DT),Support Vector Machine(SVM),Naïve Bayes(NB),Light Gradient Boosting Machine(LightGBM),K-Nearest Neighbours(KNN),Extreme Gradient Boosting(XGBoost),and Logistic Regression(LR).Subsequently,the concentrated models were validated through 10-fold Cross-Validation and Receiver Operating Characteristic(ROC)—Area Under the Curve(AUC).In addition,GridSearchCV was utilised to measure each algorithm’s best parameter;eventually,the models were trained through the hyperparameter tuning *** 98%accuracy,LightGBM had the highest accuracy in this ***,KNN,and SVM came in second with 96%***,the performance scores of NB and LR were recorded to be 76%and 83%,*** is to be mentioned that after applying 10-fold cross-validation,the average performance score of LightGBM accounted for 93%.At the same time,the percentage of ROC-AUC appeared at 0.92,which indicates that this LightGBM model reached a satisfactory ***,we extracted meaningful insights and figured out potential gaps on top of *** extracting meaningful in
The surge of cyberbullying on social media platforms is a major concern in today's digital age, with its prevalence escalating alongside advancements in technology. Thus, devising methods to detect and eliminate c...
详细信息
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants r...
详细信息
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants related to commercial and industrial systems must communicate and generate ***,due to the small storage capacities of IoT devices,they are required to store and transfer the generated data to third-party entity called“cloud”,which creates one single point to store their ***,as the number of participants increases,the size of generated data also ***,such a centralized mechanism for data collection and exchange between participants is likely to face numerous challenges in terms of security,privacy,and *** address these challenges,Federated Learning(FL)has been proposed as a reasonable decentralizing approach,in which clients no longer need to transfer and store real data in the central ***,they only share updated training models that are trained over their private *** the same time,FL enables clients in distributed systems to share their machine learning models collaboratively without their training data,thus reducing data privacy and security ***,slow model training and the execution of additional unnecessary communication rounds may hinder FL applications from operating properly in a distributed ***,these unnecessary communication rounds make the system vulnerable to security and privacy issues,because irrelevant model updates are sent between clients and ***,in this work,we propose an algorithm for fully homomorphic encryption called Cheon-Kim-Kim-Song(CKKS)to encrypt model parameters for their local information privacy-preserving *** proposed solution uses the impetus term to speed up model convergence during the model training ***,it establishes a secure communication channel between IoT devices and the *** a
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(M...
详细信息
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(ML)models rely on basic word-based feature extraction,deep learning(DL)methods,enhanced with advanced word embeddings,have shown superior *** research introduces a novel aspectbased sentiment analysis(ABSA)framework to classify app reviews based on key non-functional requirements,focusing on usability factors:effectiveness,efficiency,and *** propose a hybrid DL model,combining BERT(Bidirectional Encoder Representations from Transformers)with BiLSTM(Bidirectional Long Short-Term Memory)and CNN(Convolutional Neural Networks)layers,to enhance classification *** analysis against state-of-the-art models demonstrates that our BERT-BiLSTM-CNN model achieves exceptional performance,with precision,recall,F1-score,and accuracy of 96%,87%,91%,and 94%,*** contributions of this work include a refined ABSA-based relabeling framework,the development of a highperformance classifier,and the comprehensive relabeling of the Instagram App Reviews *** advancements provide valuable insights for software developers to enhance usability and drive user-centric application development.
A Brain Tumors are highly dangerous illnesses that significantly reduce the life expectancy of patients. The classification of brain tumors plays a crucial role in clinical diagnosis and effective treatment. The misdi...
详细信息
A Brain Tumors are highly dangerous illnesses that significantly reduce the life expectancy of patients. The classification of brain tumors plays a crucial role in clinical diagnosis and effective treatment. The misdiagnosis of brain tumors will result in wrong medical intercession and reduce chance of survival of patients Precisely diagnosing brain tumors is of utmost importance for devising suitable treatment plans that can effectively cure and improve the quality of life for patients afflicted with this condition. To tackle this challenge, present a framework that harnesses deep convolutional layers to automatically extract crucial and resilient features from the input data. Systems that use computers and with the help of convolutional neural networks have provided huge success stories in early detection of tumors. In our framework, utilize VGG19 model combined with fuzzy logic type-2 where used fuzzy logic type-2 that applied to enhancement the images brain where Type-2 fuzzy logic better handles uncertainty in medical images, improving the interpretability of image enhancement by managing noise and subtle differences with greater precision than Type-1 fuzzy logic for MRI images often contain ambiguous or low-contrast areas where noise, lighting conditions different and greatly improve accuracy. while used the VGG19 architecture to feature extraction and classify Tumor and non- Tumor. This approach enhances the accuracy of tumors classification, aiding in the development of targeted treatment strategies for patients. The method is trained on the Br35H dataset, resulting in a training accuracy of 0.9983 % and Train loss of 0.2118 while the validation accuracy of 0.9953 % validation loss of 0.2264. This demonstrates effective pattern learning and generalization capabilities. The model achieves outstanding accuracy, with a best accuracy for the model of 0.9983 %, While the test accuracy of the model reached of 99 %, and both of sensitivity and specificity at 0.9967
The convergence and integration of the Internet of Things (IoT), Cloud Computing (CC), and Big Data (BD) offer huge potential for transformative progress that will support the massive industrial revolution that is so ...
详细信息
The study of gaze tracking is a significant research area in computer vision. It focuses on real-world applications and the interface between humans and computers. Recently, new eye-tracking applications have boosted ...
详细信息
暂无评论