As per the literature study, the development of e-commerce websites is done by adopting different methodologies, which does not give due importance to the logical sequencing of the functionality of each module to be d...
详细信息
The heart disease cases are rising day by day and it is very Important to predict such diseases before it causes more harm to human lives. The diagnosis of heart disease is such a complex task i.e., it should be perfo...
详细信息
This article uses the well-known multi-criteria decision-making (MCDM) theory to determine which laptop is the best among those that are currently on the market. To illustrate the importance of decision-making in a cl...
详细信息
Estimating junction temperature during the operation of power semiconductors is essential to avoid damage and to increase lifetime. However, published literature usually presents complex solutions to determine tempera...
详细信息
The rapid advancement of deep learning methodologies has given rise to worries regarding the misuse of hyper-realistic multimedia due to the introduction of deepfake content created by generative adversarial network (...
详细信息
ISBN:
(数字)9798350375237
ISBN:
(纸本)9798350375244
The rapid advancement of deep learning methodologies has given rise to worries regarding the misuse of hyper-realistic multimedia due to the introduction of deepfake content created by generative adversarial network (GAN) models. Deepfakes, which include altered audio and/or video clips that are nearly identical to real ones, can be used maliciously for things like propaganda, cybercrimes, and political campaigns. To address this challenge, a comparison is conducted involving several CNN models, like EfficientNetB0, VGG-16, DenseNet121, VGG-19, MobileNetV2, ResNet50, InceptionV3, and Xception for deepfake detection. The models are trained using transfer learning technique and by fine-tuning them on the dataset using various hyperparameters. The performance analysis was performed on six cases in which the optimizer, learning rate, batch size, and epochs were adjusted. By exploring this comparative study, a contribution is made to the development of more robust solutions for detecting deepfakes. A thorough analysis of different pre-trained models is conducted and verified, based on the reported outcomes, ResNet50 outperforms the other models. The evaluation of the model's performance involves the comparison of various metrics that have been identified, such as Accuracy, Precision, AUC-ROC curve, and F1-score.
The proposed system aims to enhance student transportation security through real-time face detection and recognition. Leveraging the MTCNN framework for accurate face detection and the FaceNet model for reliable face ...
详细信息
ISBN:
(数字)9798331509675
ISBN:
(纸本)9798331509682
The proposed system aims to enhance student transportation security through real-time face detection and recognition. Leveraging the MTCNN framework for accurate face detection and the FaceNet model for reliable face recognition, the system ensures only authorized students can board designated buses by comparing captured faces with a pre-registered database. In case of mismatches, alerts are triggered to notify drivers and authorities. Additionally, parallel implementation of Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classifiers improves authentication accuracy. The system's deep learning-based architecture ensures robust performance under varying environmental conditions and supports continuous learning for long-term reliability.
作者:
Potuzak, TomasLipka, RichardDepartment of Computer Science and Engineering/
Ntis - New Technologies for Information Society Faculty of Applied Sciences University of West Bohemia Univerzitni 8 European Center of Excellence Plzen306 14 Czech Republic European Center of Excellence/
Department of Computer Science and Engineering Faculty of Applied Sciences University of West Bohemia Univerzitni 8 Ntis - New Technologies for the Information Society Plzen306 14 Czech Republic
The testing is an integral part of the software development. At the same time, the manual creation of individu-al test cases is a lengthy and error-prone process. Hence, an intensive research on automated test generat...
详细信息
Climate change poses significant challenges globally, impacting ecosystems, economies, and societies. Accurate prediction of climate impacts is crucial for developing effective mitigation strategies and informed polic...
详细信息
This communication delves into an encryption methodology centered around the gyrator transform and the utilization of diverse structured phase masks (SPMs). Unlike conventional random phase masks (RPMs), this approach...
详细信息
ISBN:
(数字)9798350375237
ISBN:
(纸本)9798350375244
This communication delves into an encryption methodology centered around the gyrator transform and the utilization of diverse structured phase masks (SPMs). Unlike conventional random phase masks (RPMs), this approach substitutes them with structured phase masks (SPMs) derived from Devil's Vortex Fresnel Lens (DVFL) and Fresnel Toroidal Lens (FTL). The primary objective behind incorporating these phase keys is to bolster algorithmic security by expanding the key-space. Structured phase masks (SPMs) boast the capability of housing multiple storing keys within a single-phase mask, owing to their nature as diffractive optical elements (DOEs), making them arduous to replace. Consequently, they introduce additional security parameters that enhance the system's robustness and reliability. The efficacy of the proposed schemes has been validated through computer simulations, with assessments conducted via the computation of mean-squarederror (MSE) and peak signal-to-noise ratio (PSNR) between the original and decrypted images. Furthermore, these schemes have undergone scrutiny regarding their sensitivity to various encryption parameters and their resilience against noise attacks.
暂无评论