This study makes a comprehensive assessment of the predominant Transfer Learning (TL) techniques employed for the classification of COVID-19 cases in Chest X-rays (CXR) images. The methodologies have been selected on ...
详细信息
The outbreak of COVID-19 (also known as Coronavirus) has put the entire world at risk. The disease first appears in Wuhan, China, and later spread to other countries, taking a form of a pandemic. In this paper, we try...
详细信息
Traffic rerouting is a technique used to optimize traffic flow and reduce congestion by redirecting vehicles to alternate routes. The work done in this research focuses on a specific case scenario covering a 25 k...
详细信息
Music streaming services are getting increasingly popular as a result of the prevalent need for web and smart gadgets. Melophiles are drawn toward a range of musical genres and create a unique digital footprint. The e...
详细信息
Sentiment analysis has been an active field of research for over 20 years and has gained immense popularity due to its applications in both academia and industry. Sentiment Analysis of code-mixed posts and comments on...
详细信息
In recent years, there has been a persistent focus on developing systems that can automatically identify the hate speech content circulating on diverse social media platforms. This paper describes the team "Trans...
详细信息
Over the past years, researchers across the globe have made significant efforts to develop systems capable of identifying the presence of hate speech in different languages. This paper describes the team Transformers&...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bitcoin,Ethereum,Filecoin,Hyperledger Fabric,BCOS,and BCS,current blockchain applications are still quite *** struggles with scenarios requiring high-speed transactions(e.g.,online markets)or large data storage(e.g.,video services)due to consensus efficiency *** restrictions pose risks to investors in blockchain-based economic systems(e.g.,DeFi),deterring current and potential *** protection challenges make it difficult to involve sensitive data in blockchain applications.
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s *** exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and *** the time of the attack,it appears the women were immobilized and needed immediate *** self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or *** proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud *** is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud *** can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location *** has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 *** average activation time is 2.079 s.
暂无评论