Floods are a form of unforeseen disaster which may seriously compromise human health and safety and also damage infrastructure, property, and ecosystems. Post flood management is process which involves better flood im...
详细信息
Floods are a form of unforeseen disaster which may seriously compromise human health and safety and also damage infrastructure, property, and ecosystems. Post flood management is process which involves better flood image segmentation, the mapping process, assistance with relief, and evacuation these can be enhanced by the adoption of technology. In computer vision and image processing, the segmentation of image is crucial task, it is a method which determine different types of objects in an image through defining labels to each and every pixel in a target category according to its semantics. Use of Unmanned Aerial Vehicle (UAV) is more reliable way to capturing images and video of the flood regions. This study presents a comparative analysis of the achievement of DeepLabv3+ in segmentation flooded and non-flooded regions in post-flood UAV images. The models are assessed based on key performance metrics: Accuracy, Precision, Recall, Intersection over Union (IoU) and Dice Loss. Among these, DeepLabv3+ emerged as the most effective, achieving the highest accuracy (0.9494), precision (0.9565) and IoU (0.7686), indicating its superior ability to correctly segment flood images and minimize false positives. Although its recall (0.8781) was slightly lower than that of DeepLabv3, it still demonstrated robust flood area identification. The lower Dice Loss (0.1332) further corroborates its superior segmentation quality with better segmentation.
Deep learning-based image restoration faces significant challenges when deployed on resource-constrained platforms due to the computational demands and large number of parameters in existing models. The high computati...
详细信息
Deep learning-based image restoration faces significant challenges when deployed on resource-constrained platforms due to the computational demands and large number of parameters in existing models. The high computational load and extensive memory requirements make it difficult to implement these models on devices with limited processing power and storage capacity, such as mobile phones and embedded systems. Additionally, maintaining real-time performance while ensuring high-quality image restoration is a critical challenge, as traditional deep learning models often fail to meet the stringent latency and efficiency requirements of such platforms. This paper introduces a new, lightweight convolutional neural network (CNN) architecture tailored for efficient pixelation detection and restoration. Our approach combines a pre-trained MobileNetV2 with finetuning for pixelation detection, and SpectraNet, a architecture incorporating depth-wise separable convolutions for image restoration. The proposed architecture was trained on the HQ-50k dataset, with 70% of the data used for training and 30% for testing. It achieved a Peak Signal-to-Noise Ratio (PSNR) of 17-23, outperforming 10 state-of-the-art architectures in both efficiency and image quality. This design addresses the dual problems of high computational load and extensive memory usage, prioritizing real-time performance and resource efficiency. The proposed architecture is ideal for deployment on mobile and embedded devices since it maintains high accuracy while significantly reducing the number of trainable parameters. Our findings advance the feasibility of deploying advanced image restoration techniques in real-world, resource-constrained environments.
This paper presents the influence of carbon nanotubes (CNTs) waviness, aspect ratio and damaged core on the vibrational behavior of functionally graded nanocomposite sandwich beams resting on two-parameter elastic fou...
详细信息
The growing need for effective energy management in electric vehicles (EVs) has led to advancements in power conversion technologies, especially in systems that facilitate the use of renewable energy sources and effic...
详细信息
This paper presents an autonomous garbage collection device, which uses computer vision and robotics to clean the floating waste in the local water bodies. The tedious and increasingly repetitive task of garbage colle...
详细信息
Recognizing the explosive increase in the use of artificial intelligence (AI)-based applications, several industrial companies developed custom application-specific integrated circuits (ASICs) (e.g., Google TPU, IBM R...
详细信息
Due to its high morbidity and medical expenses, DR mellitus (T2DM) is a serious global health concern. Its burden can be lessened with effective early prognosis, but the available treatments are not enough. Predictive...
详细信息
ISBN:
(数字)9798331527518
ISBN:
(纸本)9798331527525
Due to its high morbidity and medical expenses, DR mellitus (T2DM) is a serious global health concern. Its burden can be lessened with effective early prognosis, but the available treatments are not enough. Predictive modelling of Retina Images (fundus) can enhance early diagnosis and care quality. Advanced convolutional neural networks (Inception-V4, ResNet V1, and ResNet V2) are used in this study to assess the severity of Diabetic Retinopathy caused by T2DM. Using de-identified fundus data from 9,948 individuals (1,904 with a T2DM diagnosed), we used transfer learning to train these models. We have performed simple data augmentation to rectify the class imbalance. The accuracy and AUC of the ensemble model were 94.21% and 98.53%, respectively. The findings imply that the combination of ResNet and Inception-V4 enhances classification power, providing a viable approach for early T2DM identification from fundus data that may find use in clinical settings. Future research still needs to focus on improving sensitivity and integrating real-time.
The integration of blockchain technology into consumer electronics is transforming healthcare by enhancing data security and streamlining operations in devices like wearable health monitors, smart medical devices, and...
详细信息
This review examines emotion recognition from physiological signals, focusing on processing methods and classification techniques. Key aspects include signal acquisition challenges, emotion elicitation strategies, and...
详细信息
This review examines emotion recognition from physiological signals, focusing on processing methods and classification techniques. Key aspects include signal acquisition challenges, emotion elicitation strategies, and feature extraction methods across time, frequency, and time-frequency domains. The analysis highlights the strengths of these methods in capturing emotional information from signals such as ECG, GSR, RSP, SKT, BVP, EMG, and EOG. Feature selection and dimensionality reduction are explored regarding their role in optimizing the feature space for classification. The review also evaluates machine learning approaches and their applications in emotion recognition. This work addresses current capabilities, limitations, and emerging trends and provides a comprehensive overview of physiological signal-based emotion recognition.
Cybercriminals (hackers) may exploit potential vulnerabilities in a code or system for malicious reasons. As global innovation grows, so does cybersecurity, leading attackers to become more sophisticated. The attacker...
详细信息
Cybercriminals (hackers) may exploit potential vulnerabilities in a code or system for malicious reasons. As global innovation grows, so does cybersecurity, leading attackers to become more sophisticated. The attackers (hackers) are waiting for a chance to exploit our fault in order to create a backdoor for their malicious code. In light of these obstacles, we must be more attentive and sophisticated than the adversaries. The use of smart gadgets will gradually increase. As a result, we must develop an effective plan for protecting these smart devices. Given these considerations, we present a viable technique for machine learning-based malware attack detection and analysis (abbreviated MLBM-DAM). The proposed MLBM-DAM can detect malware inside any application, file, or system. In MLBM-DAM, we used a variety of machine learning algorithms to identify and analyze malware assaults, including random forest, decision tree, and k-nearest neighbors. The suggested MLBM-DAM’s practical implementation is described, as well as critical performance measures like as precision, recall, and accuracy. In addition, the suggested MLBM-DAM’s performance is compared to that of several competing approaches. The exhibited MLBM-DAM outperformed its current rivals.
暂无评论