The agriculture industry's production and food quality have been impacted by plant leaf diseases in recent years. Hence, it is vital to have a system that can automatically identify and diagnose diseases at an ini...
详细信息
The convolution layer in a convolutional neural network (CNN) is highly computationally intensive. It is crucial to design reusable low-cost hardware IP for convolutional layer for enabling hardware-based feature extr...
详细信息
The recognition of individual activity has proven its importance in many application areas. Even after the pandemic crisis worldwide, the remote monitoring of human actions and their activities has increased a lot. In...
详细信息
Micro-expressions (MEs) are fleeting involuntary facial movements, which occur frequently when people attempt to conceal their emotions. Since human eyesight cannot detect fleeting and slight changes in facial express...
详细信息
Aim: Recent advances in Artificial Intelligence (AI) and the addition of Deep Learning (DL) have made it possible to analyse both real-time and historical data from the Internet of Things (IoT). Recently, IoT technolo...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electro...
详细信息
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th...
详细信息
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from the voice signal. However, until now, most techniques have been limited to classifying whether a voice is normal or abnormal. It is crucial that the trained Artificial Intelligence (AI) be able to identify the exact pathology associated with voice for implementation in a realistic environment. Another issue is the need to suppress the ambient noise that could be mixed up with the spectra of the voice. Current work proposes a robust, less time-consuming and non-invasive technique for the identification of pathology associated with a laryngeal voice signal. More specifically, a two-stage signal filtering approach that encompasses a score-based geometric approach and a glottal inverse filtering method is applied to the input voice signal. The aim here is to estimate the noise spectra, to regenerate a clean signal and finally to deliver a completely fundamental glottal flow-derived signal. For the next stage, clean glottal derivative signals are used in the formation of a novel fused-scalogram which is currently referred to as the "Combinatorial Transformative Scalogram (CTS)." The CTS is a time-frequency domain plot which is a combination of two time-frequency scalograms. There is a thorough investigation of the performance of the two individual scalograms as well as that of the CTS *** classification metrics are used to investigate performance, which are: sensitivity, mean accuracy, error, precision, false positive rate, specificity, Cohen’s kappa, Matthews Correlation Coefficient, and F1 score. Implementation of the VOice ICar fEDerico II (VOICED) standard database provided the highest mean accuracy of 94.12% with a sensitivity of 93.85% and a specificity of 97.96% against other existing techniques. The current method performed well despite the d
In the realm of low-level vision tasks,such as image deraining and dehazing,restoring images distorted by adverse weather conditions remains a significant *** emergence of abundant computational resources has driven t...
详细信息
In the realm of low-level vision tasks,such as image deraining and dehazing,restoring images distorted by adverse weather conditions remains a significant *** emergence of abundant computational resources has driven the dominance of deep Convolutional Neural Networks(CNNs),supplanting traditional methods reliant on prior ***,the evolution of CNN architectures has tended towards increasing complexity,utilizing intricate structures to enhance performance,often at the expense of computational *** response,we propose the Selective Kernel Dense Residual M-shaped Network(SKDRMNet),a flexible solution adept at balancing computational efficiency with network accuracy.A key innovation is the incorporation of an M-shaped hierarchical structure,derived from the U-Net framework as M-Network(M-Net),within which the Selective Kernel Dense Residual Module(SDRM)is introduced to reinforce multi-scale semantic feature *** methodology employs two sampling techniques-bilinear and pixel unshuffled and utilizes a multi-scale feature fusion approach to distil more robust spatial feature map *** the reconstruction phase,feature maps of varying resolutions are seamlessly integrated,and the extracted features are effectively merged using the Selective Kernel Fusion Module(SKFM).Empirical results demonstrate the comprehensive superiority of SKDRMNet across both synthetic and real rain and haze datasets.
Coronavirus belongs to the family of Coronaviridae. It is responsible for COVID-19 communicable disease, which has affected 213 countries and territories worldwide. Researchers in computational fields have been active...
详细信息
暂无评论