Temporal ontologies allow to represent not only concepts,their properties,and their relationships,but also time-varying information through explicit versioning of definitions or through the four-dimensional perduranti...
详细信息
Temporal ontologies allow to represent not only concepts,their properties,and their relationships,but also time-varying information through explicit versioning of definitions or through the four-dimensional perdurantist *** are widely used to formally represent temporal data semantics in several applications belonging to different fields(e.g.,Semantic Web,expert systems,knowledge bases,big data,and artificial intelligence).They facilitate temporal knowledge representation and discovery,with the support of temporal data querying and ***,there is no standard or consensual temporal ontology query *** a previous work,we have proposed an approach namedτJOWL(temporal OWL 2 from temporal JSON,where OWL 2 stands for"OWL 2 Web Ontology Language"and JSON stands for"JavaScript Object Notation").τJOWL allows(1)to automatically build a temporal OWL 2 ontology of data,following the Closed World Assumption(CWA),from temporal JSON-based big data,and(2)to manage its incremental maintenance accommodating their evolution,in a temporal and multi-schema-version *** this paper,we propose a temporal ontology query language forτJOWL,namedτSQWRL(temporal SQWRL),designed as a temporal extension of the ontology query language—Semantic Query-enhanced Web Rule Language(SQWRL).The new language has been inspired by the features of the consensual temporal query language TSQL2(Temporal SQL2),well known in the temporal(relational)database *** aim of the proposal is to enable and simplify the task of retrieving any desired ontology version or of specifying any(complex)temporal query on time-varying ontologies generated from time-varying big *** examples,in the Internet of Healthcare Things(IoHT)domain,are provided to motivate and illustrate our proposal.
In recent years,there has been a significant increase in the number of people suffering from eye illnesses,which should be treated as soon as possible in order to avoid *** Fundus images are employed for this purpose,...
详细信息
In recent years,there has been a significant increase in the number of people suffering from eye illnesses,which should be treated as soon as possible in order to avoid *** Fundus images are employed for this purpose,as well as for analysing eye abnormalities and diagnosing eye *** can be recognised as bright lesions in fundus pictures,which can be thefirst indicator of diabetic *** that in mind,the purpose of this work is to create an Integrated Model for Exudate and Diabetic Retinopathy Diagnosis(IM-EDRD)with multi-level *** model uses Support Vector Machine(SVM)-based classification to separate normal and abnormal fundus images at thefirst *** input pictures for SVM are pre-processed with Green Channel Extraction and the retrieved features are based on Gray Level Co-occurrence Matrix(GLCM).Furthermore,the presence of Exudate and Diabetic Retinopathy(DR)in fundus images is detected using the Adaptive Neuro Fuzzy Inference System(ANFIS)classifier at the second level of *** detection,blood vessel extraction,and Optic Disc(OD)detection are all processed to achieve suitable ***,the second level processing comprises Morphological Component Analysis(MCA)based image enhancement and object segmentation processes,as well as feature extraction for training the ANFIS classifier,to reliably diagnose ***,thefindings reveal that the proposed model surpasses existing models in terms of accuracy,time efficiency,and precision rate with the lowest possible error rate.
In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellma...
详细信息
This article introduces a brand new supervised method to make speech sound better and clearer by getting rid of background noise and mess-ups. It brings together two kinds of signal processes: the dual-tree complex wa...
详细信息
The preface of Privacy based decentralized application and massive information Analytics has been illustrate the consequence of block chain tools to the industry. Blockchain skill as a policy allows creating a scatter...
详细信息
Community question and answer (Q&A) websites have become invaluable information and knowledge-sharing sources. Effective topic modelling on these platforms is crucial for organising and navigating the vast amount ...
详细信息
Vehicular consumer electronics, such as autonomous vehicles (AVs), need collecting large amounts of private user information, which face the risk of privacy leakage. To protect the privacy of consumers, researchers ha...
详细信息
Wireless sensor networks (WSNs) are normally conveyed in arbitrary regions with no security. The source area uncovers significant data about targets. In this paper, a plan dependent on the cloud utilising data publish...
详细信息
With the increasing popularity of smart portable electronic gadgets, voice-based online person verification systems have become prevalent. However, these systems are susceptible to attacks where illegitimate individua...
详细信息
With the increasing popularity of smart portable electronic gadgets, voice-based online person verification systems have become prevalent. However, these systems are susceptible to attacks where illegitimate individuals exploit the recorded voices of legitimate users, leading to false confirmations—spoofing attacks. To overcome this limitation, this article presents an innovative solution by combining speech and online handwritten signatures to mitigate the risks associated with spoofing attacks in voice-based authentication systems because a person has to be present in front of the system to produce an online handwritten signature. To accomplish this objective, this work proposes a novel bidirectional Legendre memory unit (BLMU), a type of recurrent neural network (RNN), for person authentication (verification) and recognition. The Legendre memory unit (LMU) is an innovative memory cell for RNNs that efficiently retains temporal/non-temporal sequential information over a long period with minimal resources. It achieves information orthogonalization by solving coupled ordinary differential equations (ODEs) and leveraging Legendre polynomials, ensuring effective data representation. The proposed framework for person authentication and recognition comprises seven convolution layers, four BLMU layers, two dense layers, and one output layer. The performance of the proposed BLMU-based deep learning framework has been evaluated on a self-generated/private dataset of combined feature matrix of voice signals and online handwritten signatures in the Devanagari script. To assess performance, experiments have also been conducted using various RNN architectures, such as LSTM, BLSTM, and ordinary differential equation recurrent neural network (ODE-RNN), to have a performance comparison with the proposed BLMU-based deep learning (DL) framework. The results demonstrate the superiority of the proposed BLMU-based DL framework in enhancing the accuracy of person verification systems,
作者:
Sharma, MansiKumar, Praveen
Department of Computer Science and Design Wardha India
Department of Computer Science and Medical Engineering Wardha India
Monitoring and analysing water quality parameters is fundamental for the early detection of natural changes in coastal bays. This paper examines regular varieties and relationships among key water quality parameters -...
详细信息
暂无评论