This paper presents a new and efficient tree data structure for sorting and collision detection of disks in 2D based on a new tree-based data structure, called hexatree, which is introduced for the first time in this ...
详细信息
A prevalent diabetic complication is Diabetic Retinopathy(DR),which can damage the retina’s veins,leading to a severe loss of *** treated in the early stage,it can help to prevent vision *** since its diagnosis takes...
详细信息
A prevalent diabetic complication is Diabetic Retinopathy(DR),which can damage the retina’s veins,leading to a severe loss of *** treated in the early stage,it can help to prevent vision *** since its diagnosis takes time and there is a shortage of ophthalmologists,patients suffer vision loss even before ***,early detection of DR is the necessity of the *** primary purpose of the work is to apply the data fusion/feature fusion technique,which combines more than one relevant feature to predict diabetic retinopathy at an early stage with greater *** procedures for diabetic retinopathy analysis are fundamental in taking care of these *** profound learning for parallel characterization has accomplished high approval exactness’s,multi-stage order results are less noteworthy,especially during beginning phase *** Connected Convolutional Networks are suggested to detect of Diabetic Retinopathy on retinal *** presented model is trained on a Diabetic Retinopathy Dataset having 3,662 images given by *** results suggest that the training accuracy of 93.51%0.98 precision,0.98 recall and 0.98 F1-score has been achieved through the best one out of the three models in the proposed *** same model is tested on 550 images of the Kaggle 2015 dataset where the proposed model was able to detect No DR images with 96%accuracy,Mild DR images with 90%accuracy,Moderate DR images with 89%accuracy,Severe DR images with 87%accuracy and Proliferative DR images with 93%accuracy.
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider sp...
详细信息
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider spread and geographically distributed nodes to support mobility,real-time interaction,and location-based *** provide optimum quality of user life in moderm buildings,we rely on a holistic Framework,designed in a way that decreases latency and improves energy saving and services efficiency with different *** EVent system Specification(DEVS)is a formalism used to describe simulation models in a modular *** this work,the sub-models of connected objects in the building are accurately and independently designed,and after installing them together,we easily get an integrated model which is subject to the fog computing *** results show that this new approach significantly,improves energy efficiency of buildings and reduces ***,with DEVS,we can easily add or remove sub-models to or from the overall model,allowing us to continually improve our designs.
The music genre classification system is crucial to users in the digital music business since it allows them to be more effective. Music suggestion and availability to consumers is one of the most successful uses of g...
详细信息
In agriculture, detecting plant diseases is crucial for optimal plant growth. Initially, input images are collected from three datasets: banana leaf spot diseases (BananaLSD) dataset, banana leaf dataset, and PSFD-Mus...
详细信息
Improved picture quality is critical to the effectiveness of object recog-nition and *** consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmo...
详细信息
Improved picture quality is critical to the effectiveness of object recog-nition and *** consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmospheric conditions,such as mist,fog,dust *** pictures then shift in intensity,colour,polarity and consistency.A general challenge for computer vision analyses lies in the horrid appearance of night images in arbitrary illumination and ambient *** recent years,target recognition techniques focused on deep learning and machine learning have become standard algorithms for object detection with the exponential growth of computer performance ***,the iden-tification of objects in the night world also poses further problems because of the distorted backdrop and dim *** Correlation aware LSTM based YOLO(You Look Only Once)classifier method for exact object recognition and deter-mining its properties under night vision was a major inspiration for this *** order to create virtual target sets similar to daily environments,we employ night images as inputs;and to obtain high enhanced image using histogram based enhancement and iterative wienerfilter for removing the noise in the *** process of the feature extraction and feature selection was done for electing the potential features using the Adaptive internal linear embedding(AILE)and uplift linear discriminant analysis(ULDA).The region of interest mask can be segmen-ted using the Recurrent-Phase Level set ***,we use deep con-volution feature fusion and region of interest pooling to integrate the presently extremely sophisticated quicker Long short term memory based(LSTM)with YOLO method for object tracking system.A range of experimentalfindings demonstrate that our technique achieves high average accuracy with a precision of 99.7%for object detection of SSAN datasets that is considerably more than that of the other standard object detection mec
Networks form an integral part of our daily lives, comprising structures known as nodes connected via ties. These networks exhibit a complex interplay of random and structured features. We encounter networks regularly...
详细信息
Networks form an integral part of our daily lives, comprising structures known as nodes connected via ties. These networks exhibit a complex interplay of random and structured features. We encounter networks regularly in our daily activities, whether it is logging into websites, commuting by train, going to work, or attending school. Networks are prevalent in various academic disciplines and practical applications, spanning biology, physics, engineering, social science, and numerous other fields. The early 21st century has witnessed a rapid expansion of techniques facilitating human interaction, significantly impacting behavior and social bonding in both urban and rural settings. The availability and accessibility of extensive population datasets have spurred ongoing research into understanding and shaping human inclinations and sociological phenomena in unconventional ways. This review delves into the nuanced aspects of social physics, exploring the rationale behind choosing this research topic, various conceptual frameworks, categorizations, and distinctions between machine learning and deep learning. The article briefly outlines the advantages of leveraging big data in social physics, highlighting its transformative potential. Lastly, the authors provide insights into several applications of social physics in subsequent sections, offering a glimpse into its real-world implications.
In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over...
详细信息
ISBN:
(纸本)9798350354379
In this present scenario, world Internet is maximum based on H2H communication only. But in the principle of IoT, it reduces direct Human-Human and Human-Machine communication. IoT provides support to work 24 X 7 over the year without affecting the accuracy of result. IoT environment is fully based on sensors and actuators. Sensor is responsible for data collection as well as for the route of transmission and actuator is responsible for security of data, communication of data and for accuracy of data. From application point of view, now days all critical sectors like: health care sectors, defense sectors, Aviation sectors, Space sectors are strictly working on the application of IoT. Most of the work is there performed by their automated systems. If any error occurs at the time of data transmission, then that may cause a serious loss for the society. So, security mechanism is most vital part for all IoT systems. Though IoT is based on machine-to-machine communications without human intervention, we need to emphasize both on device structures and their protocols. Generally, IoT devices are very small in size and its embedded applications are less complexity. We need maximum attention if any modification is carried out in its structure. There are various types of IoT protocols available, out of them two most common protocols are CoAP and MQTT. Different security algorithms are used by these protocols for encryption and decryption of these data. Two most security algorithms are AES and ECC algorithm. The algorithm which takes low time for key generation is most suitable for IoT protocols. In this research, we are going to find out different Lou points of these two protocols. Then we will analyze two most common security algorithms i.e. AES and ECC key generation time using python codes and we will compare these times to its hybrid model key generation time. At last we have proposed a new security algorithm i.e. AES-ECC hybrid algorithm for IoT communication protocols.
The multispectral satellite sensor images have multibands, which have some typical noise. There is difficult to detect this tipical noise with low resolution image. The satellite local or gloval pixel information and ...
详细信息
In this paper, we introduce a new class of polynomials, called probabilistic q-Bernstein polynomials, alongside their generating function. Assuming (Formula presented.) is a random variable satisfying moment condition...
详细信息
暂无评论