Face emotion recognition is an important subject in fields such as psychology and cognitive sciences, as well as in applications that use machine learning methods to create intelligent models capable of understanding ...
详细信息
ISBN:
(数字)9798350395440
ISBN:
(纸本)9798350395457
Face emotion recognition is an important subject in fields such as psychology and cognitive sciences, as well as in applications that use machine learning methods to create intelligent models capable of understanding human behavior. This paper addresses the challenge of negative facial emotion recognition by employing a comprehensive framework. Our approach leverages 68 facial landmarks and integrates three pre-trained convolutional neural network models (VGG19, DenseNet201, Inception V3) into a unified weighted voting system. The efficacy of our system is evaluated using the Extended Cohn-Kanade (CK+) and Karolinska Directed Emotional Faces (KDEF) databases. The results showcase the effectiveness of our approach in accurately identifying negative facial emotions. This research contributes to the advancement of emotion recognition systems., offering a promising methodology with implications for fields such as psychology., cognitive sciences., and the broader spectrum of intelligent systems reliant on facial expression analysis.
Accurate plant detection is an important task in modern precision agriculture, enabling growers to quantify their plant numbers and estimate crop yields accurately. This paper looks at an example tobacco crop with a s...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
Accurate plant detection is an important task in modern precision agriculture, enabling growers to quantify their plant numbers and estimate crop yields accurately. This paper looks at an example tobacco crop with a small dataset and aims to augment it to produce reliable object detection and counting. To obtain a trainable dataset, the source masks are separated into base classes, noise is removed from the masks, and images are augmented. The newly obtained clean dataset is then split into patches and used to obtain a JSON file describing all the labels present in the image. The model used for this job is YOLOv8 and it is trained on a COCO-formatted augmented dataset. Choosing the proper set of weights is done by evaluating and studying the performance metrics over the whole training phase, picking the one that offers the greatest balance between performance, training duration, and risk of induced overfitting due to over-learning.
This paper reviews the problems encountered with data sets recorded by IoT monitoring networks and proposes five data healing methods. The five proposed methods include classic approaches but also methods based on art...
详细信息
ISBN:
(数字)9798331532147
ISBN:
(纸本)9798331532154
This paper reviews the problems encountered with data sets recorded by IoT monitoring networks and proposes five data healing methods. The five proposed methods include classic approaches but also methods based on artificial intelligence algorithms for predicting values. Using a case study based on indoor air quality research, the performances of the five methods of filling the gaps in the recorded data are explored both from the point of view of the ease of evaluation and visualization of the data and from the point of view of the statistical properties of the series of values.
The automatic recognition of real people is particularly important in many fields of activity. The article proposes a complex system for recognizing people taking into account possible fraud attacks. A Long Short-Term...
详细信息
ISBN:
(数字)9798331518493
ISBN:
(纸本)9798331518509
The automatic recognition of real people is particularly important in many fields of activity. The article proposes a complex system for recognizing people taking into account possible fraud attacks. A Long Short-Term Memory neural network was used to detect possible frauds in the video sequences, and to recognize the person in the case after validation as a real person, two Siamese neural networks implemented with VGG 16 and ResNet 50 were tested. The obtained results were compared for Euclidean distance, Cosine distance, and for two training methods: Contrastive Loss and Triple Loss. The best results were obtained for VGG 16, Cosine distance, and Triple Loss.
One of the most important applications of UAVs is person detection for security or rescue tasks. The goal of the proposed paper is to develop, experiment, and compare the performance of two new neural networks based o...
详细信息
ISBN:
(数字)9798350369441
ISBN:
(纸本)9798350369458
One of the most important applications of UAVs is person detection for security or rescue tasks. The goal of the proposed paper is to develop, experiment, and compare the performance of two new neural networks based on the transformer architecture, Detection Transformer and Vision Transformer. Two datasets were used, an own one for testing and COCO for learning. The results are promising to take into account the difficulties of person detection at a distance.
The purpose of this article is to provide an overview of research on the analysis and interpretation of electroencephalographic (EEG) signals, using automated artificial intelligence (AI) applications based on data mi...
详细信息
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicate...
详细信息
'The cloud' points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers,...
详细信息
Enabling resilient autonomous motion planning requires robust predictions of surrounding road users' future behavior. In response to this need and the associated challenges, we introduce our model titled MTP-GO. T...
详细信息
This paper presents a blockchain-based platform for managing and issuing academic certificates that features security, transparency, non-repudiation and traceability. Relying on the security provided by Ethereum block...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
This paper presents a blockchain-based platform for managing and issuing academic certificates that features security, transparency, non-repudiation and traceability. Relying on the security provided by Ethereum blockchain and using asymmetrical cryptography in certificate generation, combined with certificate revocation mechanisms, the proposed platform offers a reliable, decentralized and secure solution that can be used by academic institutions to streamline the management of academic certificates and reduce bureaucracy.
暂无评论