Human sentiments are analyzed based on two prominent technologies, electroencephalography and image processing. Electroencephalography helps in detecting the brains activity by attaching the electrodes to the scalp. T...
详细信息
Working with Imbalance data in real-world problems is not so easy due to the different cardinality of classes. Several machine learning Techniques have been used to overcome this kind of problem for 100% original data...
详细信息
The integration of advanced security technologies, particularly the widespread deployment of mobile cameras equipped with real-time face recognition capabilities, heralds a new era of surveillance capabilities. This p...
详细信息
The authors propose a distributed field mapping algorithm that drives a team of robots to explore and learn an unknown scalar field using a Gaussian Process(GP).The authors’strategy arises by balancing exploration ob...
详细信息
The authors propose a distributed field mapping algorithm that drives a team of robots to explore and learn an unknown scalar field using a Gaussian Process(GP).The authors’strategy arises by balancing exploration objectives between areas of high error and high *** computing high error regions is impossible since the scalar field is unknown,a bio-inspired approach known as Speeding-Up and Slowing-Down is leveraged to track the gradient of the GP *** approach achieves global field-learning convergence and is shown to be resistant to poor hyperparameter tuning of the *** approach is validated in simulations and experiments using 2D wheeled robots and 2D flying mini-ature autonomous blimps.
Extracting text summarization involves the retention of only the most important sentences in a document. Finding the appropriate ranking order of the phrases in the document according to their relevance is a vital ste...
详细信息
As Flying Ad Hoc Networks (FANETs) continue to advance, ensuring robust security, privacy, and data reliability remains a significant challenge. This research presents a novel framework known as HE-FSMF-short for Homo...
详细信息
There is a great deal of interest in using Intrusion Detection Systems (IDSs) as a key component of system defense at the moment. To secure a network IDS analyzing network traffic from a location on the network or com...
详细信息
Within the dynamic field of planetary defence, machine learning has emerged as a key component that is essential to early warning systems that are tasked with forecasting the orbits and trajectories of potentially dan...
详细信息
The use of data science and technology in healthcare has completely changed how diseases are predicted and diagnosed. Through the integration of two state-of-the-art deep learning architectures - InceptionV3, VGG 19 a...
详细信息
This paper compares the time complexity of various sorting algorithms for the logic, code and time complexity of each algorithm. The sorting algorithms that this paper discusses are Selection sort, Bubble sort, Insert...
详细信息
暂无评论