Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det...
详细信息
This paper presents a synthesis method of decision-making systems based on Agents forming multiple coalitions. The condition for coalition formation is defined by a mathematical model that solves the problem of global...
详细信息
Multi-objective decision making systems based on Spatial-Temporal logics presents a class of computational systems based on Artificial Intelligence in which spatial location and time evolution of processes (events) ar...
详细信息
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me...
详细信息
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating secur-ity *** paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble *** proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of *** proposed model is applied to the KDEF dataset using 10-fold *** improvements are made to the proposed ***,the VGG16 model is applied to the seven common ***,the system usability is enhanced by analyzing and selecting only the four common and easy-to-use ***,the horizontal ensemble technique is applied to enhance the emotion recognition accuracy and minimize the error during authen-tication ***,the Horizontal Ensemble Best N-Losses(HEBNL)is applied using challenge-response emotion to improve the authentication effi-ciency and minimize the computational *** successive improvements implemented on the proposed model led to an improvement in the accuracy from 92.1%to 99.27%.
As ocular computer-aided diagnostic(CAD)tools become more widely accessible,many researchers are developing deep learning(DL)methods to aid in ocular disease(OHD)*** eye diseases like cataracts(CATR),glaucoma(GLU),and...
详细信息
As ocular computer-aided diagnostic(CAD)tools become more widely accessible,many researchers are developing deep learning(DL)methods to aid in ocular disease(OHD)*** eye diseases like cataracts(CATR),glaucoma(GLU),and age-related macular degeneration(AMD)are the focus of this study,which uses DL to examine their *** imbalance and outliers are widespread in fundus images,which can make it difficult to apply manyDL algorithms to accomplish this analytical *** creation of efficient and reliable DL algorithms is seen to be the key to further enhancing detection *** the analysis of images of the color of the retinal fundus,this study offers a DL model that is combined with a one-of-a-kind concoction loss function(CLF)for the automated identification of *** study presents a combination of focal loss(FL)and correntropy-induced loss functions(CILF)in the proposed DL model to improve the recognition performance of classifiers for biomedical *** is done because of the good generalization and robustness of these two types of losses in addressing complex datasets with class imbalance and *** classification performance of the DL model with our proposed loss function is compared to that of the baseline models using accuracy(ACU),recall(REC),specificity(SPF),Kappa,and area under the receiver operating characteristic curve(AUC)as the evaluation *** testing shows that the method is reliable and efficient.
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ...
详细信息
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati...
详细信息
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentation,and LF ***,there is a contradiction between spatial and angular resolution during the LF image acquisition *** overcome the above problem,researchers have gradually focused on the light field super-resolution(LFSR).In the traditional solutions,researchers achieved the LFSR based on various optimization frameworks,such as Bayesian and Gaussian *** learning-based methods are more popular than conventional methods because they have better performance and more robust generalization *** this paper,the present approach can mainly divided into conventional methods and deep learning-based *** discuss these two branches in light field spatial super-resolution(LFSSR),light field angular super-resolution(LFASR),and light field spatial and angular super-resolution(LFSASR),***,this paper also introduces the primary public datasets and analyzes the performance of the prevalent approaches on these ***,we discuss the potential innovations of the LFSR to propose the progress of our research field.
The problem of signal processing is extracting the desired target speaker while suppressing the annoying background noise in complex recording situation, where exists third-party talker, transport vehicle or interfere...
详细信息
In contemporary times, nations like Sri Lanka are actively enhancing their efforts to improve the life expectancy of their citizens, with a strong focus on public health. The relationship between health and life expec...
详细信息
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis...
详细信息
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development *** frameworks have been developed focusing on guiding software systemmanagers concerning offshore software ***,none of these studies delivered comprehensive guidelines for managing the whole process of *** is a considerable lack of research working on managing OSMO from a vendor’s ***,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s *** study validated the preliminary OSMO process model via a case study research *** results showed that the OSMO process model is applicable in an industrial setting with few *** industrial data collected during the case study enabled this paper to extend the preliminary OSMO process *** refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk.
暂无评论