Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)syste...
详细信息
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)system takes an input expression from a hearing or speaking-impaired person and outputs it in the form of text or voice to a normal *** existing study related to the Sign Language Recognition system has some drawbacks,such as a lack of large datasets and datasets with a range of backgrounds,skin tones,and *** research efficiently focuses on Sign Language Recognition to overcome previous *** importantly,we use our proposed Convolutional Neural Network(CNN)model,“ConvNeural”,in order to train our ***,we develop our own datasets,“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”,both of which have ambiguous backgrounds.“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”both include images of Bangla characters and numerals,a total of 24,615 and 8437 images,***“ConvNeural”model outperforms the pre-trained models with accuracy of 98.38%for“BdSL_OPSA22_STATIC1”and 92.78%for“BdSL_OPSA22_STATIC2”.For“BdSL_OPSA22_STATIC1”dataset,we get precision,recall,F1-score,sensitivity and specificity of 96%,95%,95%,99.31%,and 95.78%***,in case of“BdSL_OPSA22_STATIC2”dataset,we achieve precision,recall,F1-score,sensitivity and specificity of 90%,88%,88%,100%,and 100%respectively.
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extens...
详细信息
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie...
详细信息
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movemen...
详细信息
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movements on task offloading and reveal that data preparation time for task execution can be minimized via forward-looking scheduling. Then, a Bi-LSTM-based model is proposed to predict the trajectories of vehicles. The service area is divided into several equal-sized grids. If the actual position of the vehicle and the predicted position by the model belong to the same grid, the prediction is considered correct, thereby reducing the difficulty of vehicle trajectory prediction. Moreover, we propose a scheduling strategy for delay optimization based on the vehicle trajectory prediction. Considering the inevitable prediction error, we take some edge servers around the predicted area as candidate execution servers and the data required for task execution are backed up to these candidate servers, thereby reducing the impact of prediction deviations on task offloading and converting the modest increase of resource overheads into delay reduction in task offloading. Simulation results show that, compared with other classical schemes, the proposed strategy has lower average task offloading delays.
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s *** exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and *** the time of the attack,it appears the women were immobilized and needed immediate *** self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or *** proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud *** is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud *** can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location *** has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 *** average activation time is 2.079 s.
Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra...
详细信息
Plasma therapy is an extensively used treatment for critically unwell *** this procedure,a legitimate plasma donor who can continue to supply plasma after healing is ***,significant dangers are associated with supply ...
详细信息
Plasma therapy is an extensively used treatment for critically unwell *** this procedure,a legitimate plasma donor who can continue to supply plasma after healing is ***,significant dangers are associated with supply management,such as the ambiguous provenance of plasma and the spread of infected or subpar blood into medicinal ***,from an ideological standpoint,less powerful people may be exploited throughout the contribution ***,there is a danger to the logistics system because there are now just some plasma *** research intends to investigate the blockchain-based solution for blood plasma to facilitate authentic plasma *** parameters,including electronic identification,chain code,and certified ledgers,have the potential to exert a substantial,profound influence on the distribution and implementation process of blood *** understand the practical ramifications of blockchain,the current study provides a proof of concept approach that aims to simulate the procedural code of modern plasma distribution ecosystems using a blockchain-based *** agent-based modeling used in the testing and evaluation mimics the supply chain to assess the blockchain’s feasibility,advantages,and constraints for the plasma.
It is a significant and challenging task to detect the informative features to carry out explainable analysis for high dimensional data,especially for those with very small number of *** selection especially the unsup...
详细信息
It is a significant and challenging task to detect the informative features to carry out explainable analysis for high dimensional data,especially for those with very small number of *** selection especially the unsupervised ones are the right way to deal with this challenge and realize the ***,two unsupervised spectral feature selection algorithms are proposed in this *** group features using advanced Self-Tuning spectral clustering algorithm based on local standard deviation,so as to detect the global optimal feature clusters as far as *** two feature ranking techniques,including cosine-similarity-based feature ranking and entropy-based feature ranking,are proposed,so that the representative feature of each cluster can be detected to comprise the feature subset on which the explainable classification system will be *** effectiveness of the proposed algorithms is tested on high dimensional benchmark omics datasets and compared to peer methods,and the statistical test are conducted to determine whether or not the proposed spectral feature selection algorithms are significantly different from those of the peer *** extensive experiments demonstrate the proposed unsupervised spectral feature selection algorithms outperform the peer ones in comparison,especially the one based on cosine similarity feature ranking *** statistical test results show that the entropy feature ranking based spectral feature selection algorithm performs *** detected features demonstrate strong discriminative capabilities in downstream classifiers for omics data,such that the AI system built on them would be reliable and *** is especially significant in building transparent and trustworthy medical diagnostic systems from an interpretable AI perspective.
With the widespread global trend of voice phishing or vishing attacks, the development of effective detection models using artificial intelligence (AI) has been hindered by the lack of high-quality and large volumes o...
详细信息
暂无评论