Diagnosing data or object detection in medical images is one of the important parts of image segmentation especially those data which is less effective to identify inMRI such as low-grade tumors or cerebral spinal flu...
详细信息
Diagnosing data or object detection in medical images is one of the important parts of image segmentation especially those data which is less effective to identify inMRI such as low-grade tumors or cerebral spinal fluid(CSF)leaks in the *** aim of the study is to address the problems associated with detecting the low-grade tumor and CSF in brain is difficult in magnetic resonance imaging(MRI)images and another problem also relates to efficiency and less execution time for segmentation of medical *** tumor and CSF segmentation using trained light field database(LFD)datasets of MRI *** research proposed the new framework of the hybrid k-Nearest Neighbors(k-NN)model that is a combination of hybridization of Graph Cut and Support Vector Machine(GCSVM)and Hidden Markov Model of k-Mean Clustering Algorithm(HMMkC).There are four different methods are used in this research namely(1)SVM,(2)GrabCut segmentation,(3)HMM,and(4)k-mean clustering *** this framework,on the one hand,phase one is to perform the classification of SVM and Graph Cut algorithm to create the maximum margin *** research use GrabCut segmentation method which is the application of the graph cut algorithm and extract the data with the help of scaleinvariant features *** the other hand,in phase two,segment the low-grade tumors and CSF using a method adapted for HMkC and extract the information of tumor or CSF fluid by GCHMkC including iterative conditional maximizing mode(ICMM)with identifying the range of *** evaluation is also performing by the comparison of existing techniques in this *** conclusion,our proposed model gives better results than *** proposed model helps to common man and doctor that can identify their condition of brain *** future,this will model will use for other brain related diseases.
In visible light positioning systems,some scholars have proposed target tracking algorithms to balance the relationship among positioning accuracy,real-time performance,and ***,there are still two problems:(1)When the...
详细信息
In visible light positioning systems,some scholars have proposed target tracking algorithms to balance the relationship among positioning accuracy,real-time performance,and ***,there are still two problems:(1)When the captured LED disappears and the uncertain LED reappears,existing tracking algorithms may recognize the landmark in error;(2)The receiver is not always able to achieve positioning under various moving *** this paper,we propose an enhanced visual target tracking algorithm to solve the above ***,we design the lightweight recognition/demodulation mechanism,which combines Kalman filtering with simple image preprocessing to quickly track and accurately demodulate the ***,we use the Gaussian mixture model and the LED color feature to enable the system to achieve positioning,when the receiver is under various moving *** results show that our system can achieve high-precision dynamic positioning and improve the system’s comprehensive performance.
Industrial robots are currently applied for ship sub-assembly welding to replace welding workers because of the intelligent production and cost *** order to improve the efficiency of the robot system,a digital twin sy...
详细信息
Industrial robots are currently applied for ship sub-assembly welding to replace welding workers because of the intelligent production and cost *** order to improve the efficiency of the robot system,a digital twin system of welding path planning for the arc welding robot in ship sub-assembly welding is proposed in this manuscript to achieve autonomous planning and generation of the welding ***,a five-dimensional digital twin model of the dual arc welding robot system is ***,the system kinematics analysis and calibration are studied for communication realization between the virtual and the actual ***,a topology consisting of three bounding volume hierarchies(BVH)trees is proposed to construct digital twin virtual entities in this *** on this topology,algorithms for welding seam extraction and collision detection are ***,the genetic algorithm and the RRT-Connect algorithm combined with region partitioning(RRT-Connect-RP)are applied for the welding sequence global planning and local jump path planning,*** digital twin system and its path planning application are tested in the actual application *** results show that the system can not only simulate the actual welding operation of the arc welding robot but also realize path planning and real-time control of the robot.
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies...
详细信息
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies,they generally do not leverage progressive fusion techniques for effective feature representation and increasing receptive *** mitigate this problem,this article proposes DeepCNN,which is a fusion of spectral and temporal features of emotional speech by parallelising convolutional neural networks(CNNs)and a convolution layer-based *** parallel CNNs are applied to extract the spectral features(2D-CNN)and temporal features(1D-CNN)representations.A 2D-convolution layer-based transformer module extracts spectro-temporal features and concatenates them with features from parallel *** learnt low-level concatenated features are then applied to a deep framework of convolutional blocks,which retrieves high-level feature representation and subsequently categorises the emotional states using an attention gated recurrent unit and classification *** fusion technique results in a deeper hierarchical feature representation at a lower computational cost while simultaneously expanding the filter depth and reducing the feature *** Berlin Database of Emotional Speech(EMO-BD)and Interactive Emotional Dyadic Motion Capture(IEMOCAP)datasets are used in experiments to recognise distinct speech *** efficient spectral and temporal feature representation,the proposed SER model achieves 94.2%accuracy for different emotions on the EMO-BD and 81.1%accuracy on the IEMOCAP dataset *** proposed SER system,DeepCNN,outperforms the baseline SER systems in terms of emotion recognition accuracy on the EMO-BD and IEMOCAP datasets.
This paper explores the potential of Convolutional Neural Networks (CNNs) in diagnosing schizophrenia patients through functional Magnetic Resonance Imaging (fMRI) data, as early detection of schizophrenia, is crucial...
详细信息
People often use written words to spread hate aimed at different groups that cannot be practically detected manually. Therefore, developing an automatic system capable of identifying hate speech is crucial. However, c...
详细信息
Skin Disease is now spreading at an alarming rate. People are not aware of different types of skin diseases and for lack of treatment, it is spreading from people to people. In this study, we have tried to make skin d...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
Fundamental applications in autonomous cars, robots, and surveillance systems include object detection for safety reasons such as recognizing vehicles, pedestrians, trees, street poles, and buildings. However, one of ...
详细信息
Yoga is a popular practice that aims to improve one's health and well-being through physical postures, breathing exercises, and meditation. The growing popularity of yoga has prompted researchers to focus on autom...
详细信息
暂无评论