Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th...
详细信息
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from the voice signal. However, until now, most techniques have been limited to classifying whether a voice is normal or abnormal. It is crucial that the trained Artificial Intelligence (AI) be able to identify the exact pathology associated with voice for implementation in a realistic environment. Another issue is the need to suppress the ambient noise that could be mixed up with the spectra of the voice. Current work proposes a robust, less time-consuming and non-invasive technique for the identification of pathology associated with a laryngeal voice signal. More specifically, a two-stage signal filtering approach that encompasses a score-based geometric approach and a glottal inverse filtering method is applied to the input voice signal. The aim here is to estimate the noise spectra, to regenerate a clean signal and finally to deliver a completely fundamental glottal flow-derived signal. For the next stage, clean glottal derivative signals are used in the formation of a novel fused-scalogram which is currently referred to as the "Combinatorial Transformative Scalogram (CTS)." The CTS is a time-frequency domain plot which is a combination of two time-frequency scalograms. There is a thorough investigation of the performance of the two individual scalograms as well as that of the CTS *** classification metrics are used to investigate performance, which are: sensitivity, mean accuracy, error, precision, false positive rate, specificity, Cohen’s kappa, Matthews Correlation Coefficient, and F1 score. Implementation of the VOice ICar fEDerico II (VOICED) standard database provided the highest mean accuracy of 94.12% with a sensitivity of 93.85% and a specificity of 97.96% against other existing techniques. The current method performed well despite the d
Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia...
详细信息
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doc...
详细信息
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doctors to identify the exact model and manufacturer of the prosthesis when it is *** paper proposes a transfer learning-based class imbalance-aware prosthesis detection method to detect the implant’s manufacturer automatically from shoulder X-ray *** framework of the method proposes a novel training approach and a new set of batch-normalization,dropout,and fully convolutional layers in the head *** employs cyclical learning rates and weighting-based loss calculation *** modifications aid in faster convergence,avoid local-minima stagnation,and remove the training bias caused by imbalanced *** proposed method is evaluated using seven well-known pre-trained models of VGGNet,ResNet,and DenseNet *** is performed on a shoulder implant benchmark dataset consisting of 597 shoulder X-ray *** proposed method improves the classification performance of all pre-trained models by 10–12%.The DenseNet-201-based variant has achieved the highest classification accuracy of 89.5%,which is 10%higher than existing ***,to validate and generalize the proposed method,the existing baseline dataset is supplemented to six classes,including samples of two more implant *** results have shown average accuracy of 86.7%for the extended dataset and show the preeminence of the proposed method.
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret...
详细信息
Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr...
详细信息
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of r...
详细信息
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of rice and have a substantial impact on the yield and quality of the crop. In recent times, deep learning methods have gained prominence in predicting rice leaf diseases. Despite the increasing use of these methods, there are notable limitations in existing approaches. These include a scarcity of extensive and diverse collections of leaf disease images, lower accuracy rates, higher time complexity, and challenges in real-time leaf disease detection. To address the limitations, we explicitly investigate various data augmentation approaches using different generative adversarial networks (GANs) for rice leaf disease detection. Along with the GAN model, advanced CNN-based classifiers have been applied to classify the images with improving data augmentation. Our approach involves employing various GANs to generate high-quality synthetic images. This strategy aims to tackle the challenges posed by limited and imbalanced datasets in the identification of leaf diseases. The key benefit of incorporating GANs in leaf disease detection lies in their ability to create synthetic images, effectively augmenting the dataset’s size, enhancing diversity, and reducing the risk of overfitting. For dataset augmentation, we used three distinct GAN architectures—namely simple GAN, CycleGAN, and DCGAN. Our experiments demonstrated that models utilizing the GAN-augmented dataset generally outperformed those relying on the non-augmented dataset. Notably, the CycleGAN architecture exhibited the most favorable outcomes, with the MobileNet model achieving an accuracy of 98.54%. These findings underscore the significant potential of GAN models in improving the performance of detection models for rice leaf diseases, suggesting their promising role in the future research within this doma
Induration is a thermal treatment process wherein the green pellet properties are enhanced for subsequent reduction processes such as blast furnace and DRI production. During induration, the pellet essentially undergo...
详细信息
Cervical cancer is one of the most fatal and prevalent illnesses affecting women globally. Early detection of cervical cancer is crucial for effective treatment. Pap smear tests are commonly used, but population-based...
详细信息
暂无评论