The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of *** resilience and imperceptibility are improved by choosing an appropriate embedding *** paper gives a novel system to immerse the secret information in different videos with different *** audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB *** Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD ***-audio is linked again with the stego-video in the third *** incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research *** spread spectrum approach is used to increase the complexity of secret data *** different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively.
Numerous deep learning (DL) models based on convolutional neural network (CNN) have been developed for image classification. Though the CNN models attained outstanding performance, its architecture contains certain li...
详细信息
Numerous morphological and histological characteristics of brain tumors make diagnosis and treatment very challenging. Traditional diagnosis methods often depend on the analysis of medical images, which can lead to un...
详细信息
Multi-access Edge Computing presents a compelling solution for delivering seamless connectivity to computing services. In this study, we aim to optimize multicast throughput to ensure high-quality experiences for pass...
详细信息
Modern information technology is driving the rapid development of the information and automation industry through the combination of computertechnology, communication technology, and control technology. Inspired by n...
详细信息
Relative overgeneralization (RO) occurs in cooperative multi-agent learning tasks when agents converge towards a suboptimal joint policy due to overfitting to suboptimal behaviors of other *** methods have been propos...
详细信息
Relative overgeneralization (RO) occurs in cooperative multi-agent learning tasks when agents converge towards a suboptimal joint policy due to overfitting to suboptimal behaviors of other *** methods have been proposed for addressing RO in multi-agent policy gradient (MAPG) methods although these methods produce state-of-the-art *** address this gap, we propose a general, yet simple, framework to enable optimistic updates in MAPG methods that alleviate the RO *** approach involves clipping the advantage to eliminate negative values, thereby facilitating optimistic updates in *** optimism prevents individual agents from quickly converging to a local ***, we provide a formal analysis to show that the proposed method retains optimality at a fixed *** extensive evaluations on a diverse set of tasks including the Multi-agent MuJoCo and Overcooked benchmarks, our method outperforms strong baselines on 13 out of 19 tested tasks and matches the performance on the rest. Copyright 2024 by the author(s)
Antimicrobial resistance (AMR) is one of the significant problems in the health sector and requires resources to create and develop accurate forecasting systems capable of recognizing resistant microbes and their trea...
详细信息
A key development towards enhancing computer-human interaction is emotion recognition. This publication describes a technique called EmoCNN, which uses deep learning techniques to precisely identify and classify human...
详细信息
A key development towards enhancing computer-human interaction is emotion recognition. This publication describes a technique called EmoCNN, which uses deep learning techniques to precisely identify and classify human emotions, emphasizing improving model performance using different optimizers. Our research intends to contribute to the creation of more effective systems that improve computer-human interaction by solving the problems associated with emotion recognition. By bridging the gap between humans and robots, accurate emotion detection enables systems to perceive emotions for customized and responsive interactions. AI-powered assistants, chatbots, and social robots all benefit from emotion recognition by providing more responsive, empathic and interesting user experiences. Emotion-aware technologies can also enhance user feedback analysis, human-centered design, and monitoring of mental health. Using a human emotion detection dataset, we carried out comprehensive experiments focusing on the happy, sad, and neutral emotion classes. Constructing a customized EmoCNN model with convolutional layers, a hidden layer, ReLU activation, and max-pooling was the focus of our computational work. We investigated various optimizers and evaluated how they affected accuracy, convergence speed and loss minimization. The results demonstrated that the EmoCNN model, which had been trained using the Adam optimizer, gave the best accuracy in distinguishing between emotions. Our paper provides a comparative analysis, highlighting the superiority of EmoCNN over existing models, showcasing its ability to achieve higher validation accuracy (89%) and more efficient emotion recognition when compared to previous approaches with minimal loss. Our research advances the field of emotional computing by demonstrating how well EmoCNN can identify and categorizes various human emotions. This discovery has significant ramifications for the creation of emotion-aware computers, which can better und
Image retrieval systems based on content can be developed for mobile applications that provide users with a seamless and efficient way to search for images based on their content. The development of CBIR systems for m...
详细信息
Ransomware, a form of malicious software, encrypts victim data and renders it inaccessible until a ransom is paid. Different ransomware variants employ various tactics to avoid detection during their attacks. Understa...
详细信息
暂无评论