Diabetic retinopathy (DR) is an infection that bases eternal visualization loss in patients with diabetes mellitus. With DR, the glucose level in the blood increases, as well as its viscosity, this results in fluid le...
详细信息
Diabetic retinopathy (DR) is an infection that bases eternal visualization loss in patients with diabetes mellitus. With DR, the glucose level in the blood increases, as well as its viscosity, this results in fluid leakage into surrounding tissues in the retina. In other words, DR represents the pathology of capillaries and venules in the retina with leakage effects, being the main acute retinal disorder caused by diabetes. Many DR detection methods have been previously discussed by different researchers;however, accurate DR detection with a reduced execution time has not been achieved by existing methods. The proposed method, the Shape Adaptive box linear filtering-based Gradient Deep Belief network classifier (SAGDEB) Model, is performed to enhance the accuracy of DR detection. The objective of the SAGDEB Model is to perform an efficient DR identification with a higher accuracy and lower execution time. This model comprises three phases: pre-processing, feature extraction, and classification. The shape adaptive box linear filtering image pre-processing is carried out to reduce the image noise without removing significant parts of image content. Then, an isomap geometric feature extraction is performed to compute features of different natures, like shape, texture, and color, from the pre-processed images. After that, the Adaptive gradient Tversky Deep belief network classifier is to perform classification. The deep belief network is probabilistic and generative graphical model that consists of multiple layers such as one input unit, three hidden units, and one output unit. The extracted image featuresare considered in the input layer and these images are sent to hidden layers. Tversky similarity index is applied in hidden layer 1 to analyze the extracted features with testing features. Regarding the similarity value, the sigmoid activation function is determined in hidden layer 2 so different levels of DR can be identified. Finally, the adaptive gradient method is
Edge computing platforms enable application developers and content providers to provide context-aware services(such as service recommendations)using real-time wireless access network *** to recommend the most suitable...
详细信息
Edge computing platforms enable application developers and content providers to provide context-aware services(such as service recommendations)using real-time wireless access network *** to recommend the most suitable candidate from these numerous available services is an urgent ***-through rate(CTR)prediction is a core task of traditional service ***,many existing service recommender systems do not exploit user mobility for prediction,particularly in an edge computing *** this paper,we propose a model named long and short-term user preferences modeling with a multi-interest network based on user *** uses a logarithmic network to capture multiple interests in different fields,enriching the representations of user short-term *** terms of long-term preferences,users'comprehensive preferences are extracted in different periods and are fused using a nonlocal *** experiments on three datasets demonstrate that our model relying on user mobility can substantially improve the accuracy of service recommendation in edge computing compared with the state-of-the-art models.
One of the most significant and difficult tasks in the modern world is rainfall forecast. Rainfall is a complicated and nonlinear phenomenon that requires sophisticated computer modeling and simulation to anticipate w...
详细信息
Cyber-Physical Systems (CPS) combine physical and computational elements to produce intelligent systems communicating with their surroundings. By integrating digital and physical processes, CPS provides increased func...
详细信息
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the *** foremost and most prime sector among those affected were schools,colleges,and *** education system of entire nations had sh...
详细信息
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the *** foremost and most prime sector among those affected were schools,colleges,and *** education system of entire nations had shifted to online education during this *** shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of *** paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user *** AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based *** layer enhancements are also required,such as AI-based online proctoring and user authentication using *** extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of *** also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addres...
详细信息
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addresses this concern by introducing a novel framework for reversible image editing (RIT) supported by reversible data hiding with encrypted images (RDH-EI) techniques. Unlike traditional approaches vulnerable to hacking, this framework ensures both efficient and secure data embedding while maintaining the original image’s privacy. The framework leverages two established methods: secret writing and knowledge activity. While secret writing is susceptible to hacking due to the complex nature of cipher languages, RDH-EI-supported RIT adopts a more secure approach. It replaces the linguistic content of the original image with the semantics of a different image, rendering the encrypted image visually indistinguishable from a plaintext image. This novel substitution prevents cloud servers from detecting encrypted data, enabling the adoption of reversible data hiding (RDH) methods designed for plaintext images. The proposed framework offers several distinct advantages. Firstly, it ensures the confidentiality of sensitive information by concealing the linguistic content of the original image. Secondly, it supports reversible image editing, enabling the restoration of the original image from the encrypted version without any loss of data. Lastly, the integration of RDH techniques designed for plaintext images empowers the cloud server to embed supplementary data while preserving image quality. Incorporating convolutional neural network (CNN) and generative adversarial network (GAN) models, the framework ensures accurate data extraction and high-quality image restoration. The applications of this concealed knowledge are vast, spanning law enforcement, medical data privacy, and military communication. By addressing limitations of previous methods, it opens new avenues
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and...
详细信息
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an in...
详细信息
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an indoor trajectory, a new definition named Indoor Uncertain Semantic Trajectory is defined in this paper. In this paper, we focus on a new primitive, yet quite essential query named Indoor Uncertain Semantic Trajectory Similarity Join (IUST-Join for short), which is to match all similar pairs of indoor uncertain semantic trajectories from two sets. IUST-Join targets a number of essential indoor applications. With these applications in mind, we provide a purposeful definition of an indoor uncertain semantic trajectory similarity metric named IUS. To process IUST-Join more efficiently, both an inverted index on indoor uncertain semantic trajectories named 3IST and the first acceleration strategy are proposed to form a filtering-and-verification framework, where most invalid pairs of indoor uncertain semantic trajectories are pruned at quite low computation cost. And based on this filtering-and-verification framework, we present a highly-efficient algorithm named Indoor Uncertain Semantic Trajectory Similarity Join Processing (USP for short). In addition, lots of novel and effective acceleration strategies are proposed and embedded in the USP algorithm. Thanks to these techniques, both the time complexity and the time overhead of the USP algorithm are further reduced. The results of extensive experiments demonstrate the superior performance of the proposed work.
The agriculture industry is currently dealing with serious issues with rice plants as a result of illnesses that decrease the quantity and output of the harvest. Numerous fungi and bacteria diseases harm plants that a...
详细信息
Twitter is the best source for sentiment analysis, product reviews, current issues, etc. Sentiment analysis extracts positive and negative opinions from the Twitter data set, and R studio provides the best environment...
详细信息
暂无评论