Voice-based user interfaces (VUIs) represent a promising avenue for enhancing accessibility in humancomputer interaction (HCI). This research paper investigates the effectiveness of VUIs in addressing accessibility ch...
详细信息
Now object detection based on deep learning tries different *** uses fewer data training networks to achieve the effect of large dataset ***,the existing methods usually do not achieve the balance between network para...
详细信息
Now object detection based on deep learning tries different *** uses fewer data training networks to achieve the effect of large dataset ***,the existing methods usually do not achieve the balance between network parameters and training *** makes the information provided by a small amount of picture data insufficient to optimize model parameters,resulting in unsatisfactory detection *** improve the accuracy of few shot object detection,this paper proposes a network based on the transformer and high-resolution feature extraction(THR).High-resolution feature extractionmaintains the resolution representation of the *** and spatial attention are used to make the network focus on features that are more useful to the *** addition,the recently popular transformer is used to fuse the features of the existing *** compensates for the previous network failure by making full use of existing object *** on the Pascal VOC and MS-COCO datasets prove that the THR network has achieved better results than previous mainstream few shot object detection.
Timely estimation of earthquake magnitude plays a crucial role in the early warning systems for earthquakes. Despite the inherent danger associated with earthquake energy, earthquake research necessitates extensive pa...
详细信息
Robotic arms are widely used in the automation industry to package and deliver classified objects. When the products are small objects with very similar shapes, such as screwdriver bits with slightly different threads...
详细信息
The performance of the cloud-based systems is directly associated with the resource utilization. The maximum resource utilization indicates the high performance of cloud computing. Further, effective task scheduling i...
详细信息
Rank aggregation is the combination of several ranked lists from a set of candidates to achieve a better ranking by combining information from different sources. In feature selection problem, due to the heterogeneity ...
详细信息
Machine learning models are the backbone of smart grid optimization, but their effectiveness hinges on access to vast amounts of training data. However, smart grids face critical communication bottlenecks due to the e...
详细信息
The UAV-assisted wireless network is envisioned as a key player in the sixth generation (6G) wireless systems. One of the most challenging tasks to make it practically viable is to deploy UAVs considering user density...
详细信息
作者:
Kumar, G. MuthuHemanand, D.
Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India
Department of Computer Science and Engineering Tamil Nadu Chennai India
The field of artificial intelligence (AI) has seen significant advancements in recent years. These days, artificial intelligence (AI) tools are being utilized by organizations in both the public and commercial sectors...
详细信息
ISBN:
(纸本)9798350375237
The field of artificial intelligence (AI) has seen significant advancements in recent years. These days, artificial intelligence (AI) tools are being utilized by organizations in both the public and commercial sectors all over the world. Individuals, organizations, and society as a whole will reap broad and significant advantages as a result of the capabilities of artificial intelligence (AI) both today and in the near future. Nevertheless, these very same technical advancements give rise to significant concerns, such as the question of how to ensure that artificial intelligence technology is built and implemented in a manner that is in accordance with the applicable data privacy laws and standards. The fast development of artificial intelligence presents substantial hurdles in terms of protecting customers' privacy and the confidentiality of their data. The purpose of this essay is to suggest an all-encompassing strategy for the development of a framework to solve these concerns. First, an overview of prior research on security and privacy in artificial intelligence is presented, with an emphasis on both the progress that has been made and the limits that still remain. In the same vein, open research topics and gaps that need to be addressed in order to improve existing frameworks are recognized. Regarding the development of the framework, the topic of data protection in artificial intelligence is discussed. This includes elaborating on the significance of protecting the data that is utilized in artificial intelligence models, as well as elaborating on the policies and practices that are in place to ensure the data's safety and the methods that are utilized to maintain the data's integrity. Additionally, the security of artificial intelligence is investigated, which includes an analysis of the vulnerabilities and dangers that are present in artificial intelligence systems, as well as the presentation of instances of potential assaults and malevolent manipulations,
Unstructured Numerical Image dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
暂无评论