Environmental sound classification(ESC)involves the process of distinguishing an audio stream associated with numerous environmental *** common aspects such as the framework difference,overlapping of different sound e...
详细信息
Environmental sound classification(ESC)involves the process of distinguishing an audio stream associated with numerous environmental *** common aspects such as the framework difference,overlapping of different sound events,and the presence of various sound sources during recording make the ESC task much more complicated and *** research is to propose a deep learning model to improve the recognition rate of environmental sounds and reduce the model training time under limited computation *** this research,the performance of transformer and convolutional neural networks(CNN)are *** audio features,chromagram,Mel-spectrogram,tonnetz,Mel-Frequency Cepstral Coefficients(MFCCs),delta MFCCs,delta-delta MFCCs and spectral contrast,are extracted fromtheUrbanSound8K,ESC-50,and ESC-10,***,this research also employed three data enhancement methods,namely,white noise,pitch tuning,and time stretch to reduce the risk of overfitting issue due to the limited audio *** evaluation of various experiments demonstrates that the best performance was achieved by the proposed transformer model using seven audio features on enhanced *** UrbanSound8K,ESC-50,and ESC-10,the highest attained accuracies are 0.98,0.94,and 0.97 *** experimental results reveal that the proposed technique can achieve the best performance for ESC problems.
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut...
详细信息
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL me...
详细信息
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL methods often require substantial computational resources,hindering their application on resource-constrained *** propose the Deep Tomato Detection Network(DTomatoDNet),a lightweight DL-based framework comprising 19 learnable layers for efficient tomato leaf disease classification to overcome *** Convn kernels used in the proposed(DTomatoDNet)framework is 1×1,which reduces the number of parameters and helps in more detailed and descriptive feature extraction for *** proposed DTomatoDNet model is trained from scratch to determine the classification success rate.10,000 tomato leaf images(1000 images per class)from the publicly accessible dataset,covering one healthy category and nine disease categories,are utilized in training the proposed DTomatoDNet *** specifically,we classified tomato leaf images into Target Spot(TS),Early Blight(EB),Late Blight(LB),Bacterial Spot(BS),Leaf Mold(LM),Tomato Yellow Leaf Curl Virus(YLCV),Septoria Leaf Spot(SLS),Spider Mites(SM),Tomato Mosaic Virus(MV),and Tomato Healthy(H).The proposed DTomatoDNet approach obtains a classification accuracy of 99.34%,demonstrating excellent accuracy in differentiating between tomato *** model could be used on mobile platforms because it is lightweight and designed with fewer *** farmers can utilize the proposed DTomatoDNet methodology to detect disease more quickly and easily once it has been integrated into mobile platforms by developing a mobile application.
The automatic detection of brain tumor is an emerging challenge because tumors vary in mass, nature, position, and similarities between the normal and brain lesions. First, the Magnetic Resonance Imaging (MRI) images ...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world *** existing analysis of software security vulnerabilities often focuses on specific features or *** partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the *** key novelty lies in overcoming the constraints of partial *** proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security *** guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each *** guidelines are not only practical but also applicable in real-world software,allowing for prioritized security *** proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related *** analysis resulted in the identification of a total of 121 *** successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
Cardiovascular diseases (CVDs) are a group of diseases that affect the heart or blood vessels and are the leading cause of mortality around the world. The main focus of this work is to classify heart sounds accurately...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
Continuous advancements in visible-light communication(VLC)technology have paved the way for future high-capacity communication links that can simultaneously provide data transmission and *** is being accepted as a po...
详细信息
Continuous advancements in visible-light communication(VLC)technology have paved the way for future high-capacity communication links that can simultaneously provide data transmission and *** is being accepted as a potential complementary technology in 5G networks,and standardization efforts through IEEE 802.15.7 are on their ***,vehicular networking applications have become increasingly complex with tight power and performance ***,devices and systems that can meet diverse vehicular networking applications are in great *** this article,we discuss three alternatives for vehicular networking applications in(1)LED–photodiode-based active VLC,(2)VLC with a multicamera array receiver,and(3)passive VLC based on decoding information from optical *** also present our recent experimental and modeling work using our camera-based and passive VLC prototype implementations.
This study investigates the application of deep learning,ensemble learning,metaheuristic optimization,and image processing techniques for detecting lung and colon cancers,aiming to enhance treatment efficacy and impro...
详细信息
This study investigates the application of deep learning,ensemble learning,metaheuristic optimization,and image processing techniques for detecting lung and colon cancers,aiming to enhance treatment efficacy and improve survival *** introduce a metaheuristic-driven two-stage ensemble deep learning model for efficient lung/colon cancer *** diagnosis of lung and colon cancers is attempted using several unique indicators by different versions of deep Convolutional Neural Networks(CNNs)in feature extraction and model constructions,and utilizing the power of various Machine Learning(ML)algorithms for final ***,we consider different scenarios consisting of two-class colon cancer,three-class lung cancer,and fiveclass combined lung/colon cancer to conduct feature extraction using four *** extracted features are then integrated to create a comprehensive feature *** the next step,the optimization of the feature selection is conducted using a metaheuristic algorithm based on the Electric Eel Foraging Optimization(EEFO).This optimized feature subset is subsequently employed in various ML algorithms to determine the most effective ones through a rigorous evaluation *** top-performing algorithms are refined using the High-Performance Filter(HPF)and integrated into an ensemble learning framework employing weighted *** findings indicate that the proposed ensemble learning model significantly surpasses existing methods in classification accuracy across all datasets,achieving accuracies of 99.85%for the two-class,98.70%for the three-class,and 98.96%for the five-class datasets.
暂无评论