Stress has a remarkable impact on various cognitive functions, demanding timely and effective detection using strategies deployed across interdisciplinary domains. It influences decision-making, attention, learning, a...
详细信息
Stress has a remarkable impact on various cognitive functions, demanding timely and effective detection using strategies deployed across interdisciplinary domains. It influences decision-making, attention, learning, and problem-solving abilities. As a result, stress detection and modeling have become important areas of study in both psychology and computerscience. This study links the fields of psychology and machine learning to deal with the urgent requirement of accurate stress detection methodologies and highlights sleep patterns as a key indicator for stress detection, discussing a novel approach to understand and determine stress levels. Psychologists use affective states to measure stress, which refers to a sense of feeling an underlying emotional state. However, most stress classification work has been limited to user-dependent models, which new users cannot use without additional training. This can be a significant time burden for new users trying to predict their affective states. Therefore, it is critical to address basic mental health issues in children and adults to prevent them from developing more complex problems on account of undergoing stress. The medical field processes vast amounts of medical data;the machine learning algorithms sift through patterns that might escape the human eye. The machine learning algorithms act as detectives, able to spot correlations and bring out a sense of complex information. The machine learning algorithms reveal fine correlations and patterns, aiding in more precise and prompt diagnoses particularly to focus fundamental mental health issues in individuals of all ages. This research work deploys an enhanced Multilayer Perceptron (MLP), exhibiting an extensive feature analysis for processing medical datasets, resulting in improved effectiveness in predicting stress levels. This helps us to diagnose issues more accurately and swiftly which improves the patient outcomes. The proposed and enhanced MLP model undergoes stri
Plasma therapy is an extensively used treatment for critically unwell *** this procedure,a legitimate plasma donor who can continue to supply plasma after healing is ***,significant dangers are associated with supply ...
详细信息
Plasma therapy is an extensively used treatment for critically unwell *** this procedure,a legitimate plasma donor who can continue to supply plasma after healing is ***,significant dangers are associated with supply management,such as the ambiguous provenance of plasma and the spread of infected or subpar blood into medicinal ***,from an ideological standpoint,less powerful people may be exploited throughout the contribution ***,there is a danger to the logistics system because there are now just some plasma *** research intends to investigate the blockchain-based solution for blood plasma to facilitate authentic plasma *** parameters,including electronic identification,chain code,and certified ledgers,have the potential to exert a substantial,profound influence on the distribution and implementation process of blood *** understand the practical ramifications of blockchain,the current study provides a proof of concept approach that aims to simulate the procedural code of modern plasma distribution ecosystems using a blockchain-based *** agent-based modeling used in the testing and evaluation mimics the supply chain to assess the blockchain’s feasibility,advantages,and constraints for the plasma.
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
Question classification (QC) is a process that involves classifying questions based on their type to enable systems to provide accurate responses by matching the question type with relevant information. To understand ...
详细信息
This research-to-practice pre-conference workshop brings insights and approaches to equitable syllabus development to college-level instructors. The organizers synthesize their experiences and research on the structur...
详细信息
ISBN:
(数字)9798350351507
ISBN:
(纸本)9798350363067
This research-to-practice pre-conference workshop brings insights and approaches to equitable syllabus development to college-level instructors. The organizers synthesize their experiences and research on the structures, culture, and equity initiatives of US engineering education. The first half of the workshop presents participants with frameworks for thinking about equitable engineering syllabi and a technique for actualizing those values (i.e., the organizers' syllabus toolkit). In the second half, participants apply and reflect upon their insights and techniques with a sample syllabus and then participants' own instructional materials. Participants will leave the two-and-a-half-hour workshop with skills and methods for evaluating their syllabi in addition to concrete revisions of their own materials.
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into sever...
详细信息
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into several pieces by the XOR coding, and each piece is routed via different paths. Then, an adversary cannot obtain the original message unless she eavesdrops on all message pieces from all the paths. In this paper, we extend such an approach into secure multicast routing, which is a one-to-many communication primitive. To this end, we propose the multi-tree-based avoidance multicast routing protocol (AMRP) for WSNs, in which a set of adversary disjoint trees is discovered, i.e., a set of multicast trees with no common adversaries. When a set of multicast trees is adversary disjoint, no adversary can eavesdrop on all message pieces to recover the original message. In addition, optimized AMRP (OAMRP) is proposed in order to reduce the control overhead of AMRP, where additional multicast trees are used for only a subset of destination nodes with no single safe tree. The simulation results demonstrate that the proposed protocols achieve higher secure delivery rates than a simple extension of the existing unicast avoidance routing protocol. IEEE
The Computational Visual Media(CVM)conference series is intended to provide a prominent international forum for exchanging innovative research ideas and significant computational methodologies that either underpin or ...
详细信息
The Computational Visual Media(CVM)conference series is intended to provide a prominent international forum for exchanging innovative research ideas and significant computational methodologies that either underpin or apply visual media.
In recent years, artificial intelligence has undergone robust development, leading to the emergence of numerous autonomous AI applications. However, a crucial challenge lies in optimizing computational efficiency and ...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s *** exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and *** the time of the attack,it appears the women were immobilized and needed immediate *** self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or *** proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud *** is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud *** can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location *** has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 *** average activation time is 2.079 s.
暂无评论