This paper addresses the passive source localization problem using hybrid angle-of-arrival (AOA) and time-difference-of-arrival (TDOA) measurements observed by single stationary receiver at several time intervals, whe...
详细信息
Ischemic heart disease(IHD)is one of the leading causes of death ***,different geographic regions show different variations of the risk factors of this disease based on the different lifestyles of *** study examines t...
详细信息
Ischemic heart disease(IHD)is one of the leading causes of death ***,different geographic regions show different variations of the risk factors of this disease based on the different lifestyles of *** study examines the current IHD condition in southern Bangladesh,a Southeast Asian middle-income *** main approach to this research is an Al-based proposal of a reduced set of the greatest impact clinical traits that may cause *** approach attempts to reduce IHD morbidity and mortality by early detection of risk factors using the reduced set of clinical ***,diagnostic,and symptomatic features were considered for analysing this clinical *** pre-processing utilizes several machine learning techniques to select significant features and make meaningful interpretations.A proposed voting mechanism ranked the selected 138 features by their impact *** this regard,diverse patterns in correlations with variables,including age,sex,career,family history,obesity,etc.,were calculated and explained in terms of voting *** the 138 risk factors,three labels were categorized:high-risk,medium-risk,and low-risk features;19 features were regarded as high,25 were medium,and 94 were considered low impactful *** research's technological methodology and practical goals provide an innovative and resilient framework for addressing IHD,especially in less developed cities and townships of Bangladesh,where the general population's socioeconomic conditions are often *** data collection,pre-processing,and use of this study's complete and comprehensive IHD patient dataset is another innovative *** believe that other relevant research initiatives will benefit from this work.
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired c...
详细信息
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired candidates in point-to-point ***,such patterns could yield a high number of false-positive co-peaks,resulting in over-segmentation whenever there are mutual *** tackle with this issue,this paper proposes an instance co-segmentation method via tensor-based salient co-peak search(TSCPS-ICS).The proposed method explores high-order correlations via triple-to-triple matching among feature maps to find reliable co-peaks with the help of co-saliency *** proposed method is shown to capture more accurate intra-peaks and inter-peaks among feature maps,reducing the false-positive rate of co-peak *** having accurate co-peaks,one can efficiently infer responses of the targeted *** on four benchmark datasets validate the superior performance of the proposed method.
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).I...
详细信息
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure *** paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure *** constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse *** the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are *** is evaluated,and the data results demonstrate that SCD achieves the above objectives.
Edge caching is a promising technique for effectively reducing backhaul pressure and content access latency in the Internet of Vehicles (IoV). The existing content caching solutions still face the following challenges...
详细信息
Research on panicle detection is one of the most important aspects of paddy phenotypic analysis.A phenotyping method that uses unmanned aerial vehicles can be an excellent alternative to field-based ***,it entails man...
详细信息
Research on panicle detection is one of the most important aspects of paddy phenotypic analysis.A phenotyping method that uses unmanned aerial vehicles can be an excellent alternative to field-based ***,it entails many other challenges,including different illuminations,panicle sizes,shape distortions,partial occlusions,and complex *** detection algorithms are directly affected by these *** work proposes a model for detecting panicles called Border Sensitive Knowledge Distillation(BSKD).It is designed to prioritize the preservation of knowledge in border areas through the use of feature *** feature-based knowledge distillation method allows us to compress the model without sacrificing its *** imitation mask is used to distinguish panicle-related foreground features from irrelevant background features.A significant improvement in Unmanned Aerial Vehicle(UAV)images is achieved when students imitate the teacher’s *** the UAV rice imagery dataset,the proposed BSKD model shows superior performance with 76.3%mAP,88.3%precision,90.1%recall and 92.6%F1 score.
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is es...
详细信息
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart ***,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be ***,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue ***,most existing SE schemes cannot solve the vector dominance threshold *** response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this *** use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold ***,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
X-ray security inspection for detecting prohibited items is widely used to maintain social order and ensure the safety of people’s lives and property. Due to the large number of parameters and high computational comp...
详细信息
The medical domain faces unique challenges in Information Retrieval (IR) due to the complexity of medical language and terminology discrepancies between user queries and documents. While traditional Keyword-Based Meth...
详细信息
In the field of object detection for remote sensing images, especially in applications such as environmental monitoring and urban planning, significant progress has been made. This paper addresses the common challenge...
详细信息
暂无评论