In this research, a explore the realm of medical imaging, specifically focusing on early brain pathology detection through the lens of deep learning. The primary objective is to optimize SqueezeNet, lightweight convol...
详细信息
Alzheimer's disease (AD), is the most common form of dementia that affects the nervous system. In the past few years, non-invasive early AD diagnosis has become more popular as a way to improve patient care and tr...
详细信息
作者:
Gudadhe, Amit AnilReddy, K.T.V.
Faculty of Engineering and Technology Computer Science and Design Department Wardha India
Faculty of Engineering and Technology Wardha India
For social and economic development of any region, groundwater plays a very vital role. Surface water infiltration depends on various parameters of the earth. The parameters includes Slope, Geology, Soil Type, Land Us...
详细信息
Road accidents have become a major cause of death worldwide. Common causes of these accidents include speeding, driving while intoxicated, and unpredictable weather conditions. However, the primary cause of these acci...
详细信息
The learning to defer (L2D) framework allows models to defer their decisions to human experts. For L2D, the Bayes optimality is the basic requirement of theoretical guarantees for the design of consistent surrogate lo...
The learning to defer (L2D) framework allows models to defer their decisions to human experts. For L2D, the Bayes optimality is the basic requirement of theoretical guarantees for the design of consistent surrogate loss functions, which requires the minimizer (i.e., learned classifier) by the surrogate loss to be the Bayes optimality. However, we find that the original form of Bayes optimality fails to consider the dependence between the model and the expert, and such a dependence could be further exploited to design a better consistent loss for L2D. In this paper, we provide a new formulation for the Bayes optimality called dependent Bayes optimality, which reveals the dependence pattern in determining whether to defer. Based on the dependent Bayes optimality, we further present a deferral principle for L2D. Following the guidance of the deferral principle, we propose a novel consistent surrogate loss. Comprehensive experimental results on both synthetic and real-world datasets demonstrate the superiority of our proposed method. Copyright 2024 by the author(s)
Throughout the years, automobile companies achieved outstanding progress in manufacturing safe, reliable, and affordable vehicles. Many companies and manufacturers are developing autonomous cars for the future years. ...
详细信息
In the present world, as Internet of Things (IoT) based sensor monitoring and conditional controlling technology has been embedded in our day-to-day lives, there is a need for logging and storing sensor data for big d...
详细信息
The air is an essential aspect of humans' daily lives as it helps in breathing. With the rise of air pollution, it is necessary to have an efficient air quality monitoring system that can detect the concentration ...
详细信息
The aim of the voice-based billing system in Kannada is traditional billing by leveraging speech recognition. This project focuses on creating an efficient system for generating bills and transactions using spoken Kan...
详细信息
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addres...
详细信息
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addresses this concern by introducing a novel framework for reversible image editing (RIT) supported by reversible data hiding with encrypted images (RDH-EI) techniques. Unlike traditional approaches vulnerable to hacking, this framework ensures both efficient and secure data embedding while maintaining the original image’s privacy. The framework leverages two established methods: secret writing and knowledge activity. While secret writing is susceptible to hacking due to the complex nature of cipher languages, RDH-EI-supported RIT adopts a more secure approach. It replaces the linguistic content of the original image with the semantics of a different image, rendering the encrypted image visually indistinguishable from a plaintext image. This novel substitution prevents cloud servers from detecting encrypted data, enabling the adoption of reversible data hiding (RDH) methods designed for plaintext images. The proposed framework offers several distinct advantages. Firstly, it ensures the confidentiality of sensitive information by concealing the linguistic content of the original image. Secondly, it supports reversible image editing, enabling the restoration of the original image from the encrypted version without any loss of data. Lastly, the integration of RDH techniques designed for plaintext images empowers the cloud server to embed supplementary data while preserving image quality. Incorporating convolutional neural network (CNN) and generative adversarial network (GAN) models, the framework ensures accurate data extraction and high-quality image restoration. The applications of this concealed knowledge are vast, spanning law enforcement, medical data privacy, and military communication. By addressing limitations of previous methods, it opens new avenues
暂无评论