Diabetic Eye Disease(DED)is a fundamental cause of blindness in human beings in the medical *** techniques are proposed to forecast and examine the stages in Prognostication of Diabetic Retinopathy(DR).The Machine Lea...
详细信息
Diabetic Eye Disease(DED)is a fundamental cause of blindness in human beings in the medical *** techniques are proposed to forecast and examine the stages in Prognostication of Diabetic Retinopathy(DR).The Machine Learning(ML)and the Deep Learning(DL)algorithms are the predomi-nant techniques to project and explore the images of *** though some solu-tions were adapted to challenge the cause of DR disease,still there should be an efficient and accurate DR prediction to be adapted to refine its *** this work,a hybrid technique was proposed for classification and prediction of *** proposed hybrid technique consists of Ensemble Learning(EL),2 Dimensional-Conventional Neural Network(2D-CNN),Transfer Learning(TL)and Correlation ***,the Stochastic Gradient Boosting(SGB)EL method was used to predict the ***,the boosting based EL method was used to predict the DR of *** 2D-CNN was applied to categorize the various stages of DR ***,the TL was adopted to transfer the clas-sification prediction to training *** this TL was applied,a new predic-tion feature was *** the experiment,the proposed technique has achieved 97.8%of accuracy in prophecies of DR images and 98%accuracy in grading of *** experiment was also extended to measure the sensitivity(99.6%)and specificity(97.3%)*** predicted accuracy rate was com-pared with existing methods.
The widespread impact of coronavirus disease 2019 (COVID-19) has led to a severe health crisis and loss of life affecting billions of people. Detecting COVID-19 early on and distinguishing it from other illnesses is a...
详细信息
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed *** closed network is intended to share sensitive location-centric information from a source node to the ba...
详细信息
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed *** closed network is intended to share sensitive location-centric information from a source node to the base station through efficient routing *** efficiency of the sensor node is energy bounded,acts as a concentrated area for most researchers to offer a solution for the early draining power of *** management plays a significant role in wireless sensor networks,which was obsessed with the factors like the reliability of the network,resource management,energy-efficient routing,and scalability of *** topology of the wireless sensor networks acts dri-ven factor for network efficiency which can be effectively maintained by perform-ing the clustering process *** solutions and clustering algorithms have been offered by various researchers,but the concern of reduced efficiency in the routing process and network management still *** research paper offers a hybrid algorithm composed of a memetic algorithm which is an enhanced version of a genetic algorithm integrated with the adaptive hill-climbing algorithm for performing energy-efficient clustering process in the wireless sensor *** memetic algorithm employs a local searching methodology to mitigate the premature convergence,while the adaptive hill-climbing algorithm is a local search algorithm that persistently migrates towards the increased elevation to determine the peak of the mountain(i.e.,)best cluster head in the wireless sensor *** proposed hybrid algorithm is compared with the state of art clus-tering algorithm to prove that the proposed algorithm outperforms in terms of a network life-time,energy consumption,throughput,etc.
In general, cloud security is capable of providing various information, applications, services, etc. using extensive policies and progressive technologies. On the other hand, loss of data, confidentiality breaches, an...
详细信息
With the growth of the World Wide Web, a large amount of music data is available on the Internet. A large number of people listen to music online rather than downloading and listening offline. But only some sites prov...
详细信息
Social media usage has significantly increased in the modern world. People utilize them as a platform to communicate their thoughts, feelings, and experiences as well as a great deal of personal data. There is no one ...
详细信息
ISBN:
(纸本)9798400709418
Social media usage has significantly increased in the modern world. People utilize them as a platform to communicate their thoughts, feelings, and experiences as well as a great deal of personal data. There is no one definition of personality that is widely recognized because it is a complicated and multidimensional notion. However, it is typically used to describe the consistent thought, feeling, and behavior patterns that set people apart from one another. The process of predicting a person's personality characteristics based on their text data. The business could benefit from using all of this information to grow and better understand user needs. This paper proposes a method of creating a framework for predicting a person's personality using information from threads. The technology of feature extraction from the dataset and machine learning is being used in the framework. There isn't a system in place right now to evaluate and quantify user threads. This paper also provides an overview for predicting personality and behavior from a user's thread's post.
The development and use of Internet of Things(IoT)devices have grown significantly in recent *** IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT *** ...
详细信息
The development and use of Internet of Things(IoT)devices have grown significantly in recent *** IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT *** have begun to embrace the IoT *** true and suitable devices,security faults that might be used for bad reasons,and administration of such devices are only a few of the issues that IoT,a new concept in technological progress,*** some ways,IoT device traffic differs from regular device *** with particular features can be classified into categories,irrespective of their function or ***-changing and complex environments,like a smart home,demand this classification scheme.A total of 41 IoT devices were employed in this *** build a multiclass classification model,IoT devices contributed 13 network traffic *** further preprocess the raw data received,preprocessing techniques like Normalization and Dataset Scaling were *** engineering techniques can extract features from the text data.A total of 117,423 feature vectors are contained in the dataset after stratification,which are used to further improve the classification *** this study,a variety of performance indicators were employed to show the performance of the logiboosted ***-XGB scored 80.2%accuracy following application of the logit-boosted algorithms to the dataset for classification,whereas Logi-GBC achieved 77.8%***,Logi-ABC attained 80.7%***-CBC,on the other hand,received the highest Accuracy score of 85.6%.The accuracy of Logi-LGBM and Logi-HGBC was the same at 81.37%*** suggested Logi-CBC showed the highest accuracy on the dataset when compared to existing Logit-Boosted Algorithms used in earlier studies.
This paper proposes the Modified Light GBM to classify the Malicious Users (MUs) and legitimate Secondary Users (SUs) in the cognitive-radio network. The proposed method is to avoid the consequences of malicious users...
详细信息
A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is *** theoretical and numerical results show that the reconstruction result with high quality can be obtained by a...
详细信息
A scheme to improve the quality in ghost imaging(GI)by controlling the bandwidth of light source(BCGI)is *** theoretical and numerical results show that the reconstruction result with high quality can be obtained by adjusting the bandwidth range of the light source appropriately,and the selection criterion of the bandwidth is analyzed by the power distribution of the imaging target.A proof-of-principle experiment is implemented to verify the theoretical and numerical *** addition,the BCGI also presents better anti-noise performance when compared with some popular GI methods.
The Entry detection system as the name suggests detects entry attempts. Till date entry to organizations like schools and colleges are provided by the guards that do not map entries and exits to the premises very effi...
详细信息
暂无评论