Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate ...
详细信息
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate detection capability,but their detection computational efficiency is *** recent years,with the increasing application of deep learning in ocean feature detection,many deep learning-based eddy detection models have been developed for more effective eddy detection from ocean *** it is difficult for them to precisely fit some physical features implicit in traditional methods,leading to inaccurate identification of ocean *** this study,to address the low efficiency of traditional physical methods and the low detection accuracy of deep learning models,we propose a solution that combines the target detection model Faster Region with CNN feature(Faster R-CNN)with the traditional dynamic algorithm Angular Momentum Eddy Detection and Tracking Algorithm(AMEDA).We use Faster R-CNN to detect and generate bounding boxes for eddies,allowing AMEDA to detect the eddy center within these bounding boxes,thus reducing the complexity of center *** demonstrate the detection efficiency and accuracy of this model,this paper compares the experimental results with AMEDA and the deep learning-based eddy detection method *** results show that the eddy detection results of this paper are more accurate than eddyNet and have higher execution efficiency than AMEDA.
Object detection in thermal images is vital for diverse applications, utilizing machine learning algorithms to analyze infrared radiation. This study focuses on classifying contrast-enhanced thermal images (CLAHE) usi...
详细信息
Background: information about project tasks stored in Issue tracking systems (ITS) can be used for project analytics or process simulation. However, such issues must be classified beforehand. Considering the number of...
详细信息
Background: Pneumonia is one of the leading causes of death and disability due to respiratory infections. The key to successful treatment of pneumonia is in its early diagnosis and correct classification. PneumoniaNet...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Increasing the life span and efficiency of Multiprocessor System on Chip(MPSoC)by reducing power and energy utilization has become a critical chip design challenge for multiprocessor *** the advancement of technology,...
详细信息
Increasing the life span and efficiency of Multiprocessor System on Chip(MPSoC)by reducing power and energy utilization has become a critical chip design challenge for multiprocessor *** the advancement of technology,the performance management of central processing unit(CPU)is *** densities and thermal effects are quickly increasing in multi-core embedded technologies due to shrinking of chip *** energy consumption reaches a threshold that creates a delay in complementary metal oxide semiconductor(CMOS)circuits and reduces the speed by 10%–15%because excessive on-chip temperature shortens the chip’s life *** this paper,we address the scheduling&energy utilization problem by introducing and evaluating an optimal energy-aware earliest deadline first scheduling(EA-EDF)based technique formultiprocessor environments with task migration that enhances the performance and efficiency in multiprocessor systemon-chip while lowering energy and power *** selection of core andmigration of tasks prevents the system from reaching itsmaximumenergy utilization while effectively using the dynamic power management(DPM)*** in the execution of tasks the temperature and utilization factor(u_(i))on-chip increases that dissipate more *** proposed approach migrates such tasks to the core that produces less heat and consumes less power by distributing the load on other cores to lower the temperature and optimizes the duration of idle and sleep times across multiple *** performance of the EA-EDF algorithm was evaluated by an extensive set of experiments,where excellent results were reported when compared to other current techniques,the efficacy of the proposed methodology reduces the power and energy consumption by 4.3%–4.7%on a utilization of 6%,36%&46%at 520&624 MHz operating frequency when particularly in comparison to other energy-aware methods for *** are running and accurately scheduled to make an energy-efficient
The knapsack problem is a classic NP-Hard optimization challenge with wide-ranging applications in computerscience, such as resource allocation. While several variants have been developed, including the 0/1, fraction...
详细信息
Heart disease (HD) stands as a major global health challenge, being a predominant cause of death and demanding intricate and costly detection methods. The widespread impact of heart failure, contributing to increased ...
详细信息
This paper presents MCI-GAN, a novel menstrual cycle imputation (MCI) and generative adversarial network (GAN) framework designed to address the challenge of missing pixel imputation in medical images. Inspired by the...
详细信息
The global spread of the Coronavirus has caused a disastrous effect, affecting millions of people and making it crucial to take action. Numerous experts have worked extensively to create viable vaccines in the fight a...
详细信息
暂无评论