This paper introduces a personalized AI-based fitness tracker that provides dynamic diet and workout recommendations using the MERN stack, Llama 3 for natural language processing (NLP), and Hugging Face for machine le...
详细信息
The task of identifying key skills from job vacancies descriptions is considered in the article. The source data consists of vacancy texts from the 'Jobs in Russia' portal, in which skill-related entities were...
详细信息
An index is a tool for comparing a phenomenon or several phenomena dating back to different periods to know the amount of change in the phenomena or the difference between them. For example, we compare the price of a ...
详细信息
The healthcare system currently relies on the facility to store and process large amounts of health data, supported by efficient management. The Internet of Things (IoT) has driven the growth of Adroit Healthcare, whi...
详细信息
The arithmetic and logic unit (ALU) is a key element of complex circuits and an intrinsic part of the most widely recognized complex circuits in digital signal processing. Also, recent attention has been brought to re...
详细信息
This research is centered on a comprehensive investigation into the impact of turbulence on the movement and dispersion of materials within a three-dimensional(3D)bedform,specifically when there is a continuous presenc...
详细信息
This research is centered on a comprehensive investigation into the impact of turbulence on the movement and dispersion of materials within a three-dimensional(3D)bedform,specifically when there is a continuous presence of rigid vegetation submerged in thefl*** achieve our research objectives,we conducted extensive velocity measurements within a channel featuring this submerged *** measurements were carried out using an Acoustic Doppler Velocimeter(ADV).Additionally,our study delved into the intricate structures and turbulent characteristics of theflow,considering the coexistence of submerged vegetation and a 3D gravel *** pool featured entrance and exit slopes measuring 3 and 2.5°,*** experimental setup took place in a straightflume,measuring 14 m in length,0.9 m in width,and 0.6 m in ***flume was equipped with transparent side walls to facilitate ***,our investigation extended to the spatial variations in velocity and turbulence *** analyzed various parameters including turbulence kinetic energy,integral turbulence lengths,dispersion coefficients,and advective *** results revealed that integral length scales offer key insights into turbulent eddy *** the presence of vegetation and a 3D bedform,turbulent eddies undergo notable changes,flattening in the longitudinal direction and expanding in the transverse and vertical ***,longitudinal advection is notably higher compared toflows without vegetation in a uniformflow or bare channel,especially for z/H>*** indicates that the presence of vegetation and a 3D bedform leads to an increase in turbulent kinetic energy(k values)that surpasses the reduction in the time-averaged velocity component(“U”)in the U×k term,thereby enhancing longitudinal advection.
Background In recent years,the demand for interactive photorealistic three-dimensional(3D)environments has increased in various fields,including architecture,engineering,and ***,achieving a balance between the quality...
详细信息
Background In recent years,the demand for interactive photorealistic three-dimensional(3D)environments has increased in various fields,including architecture,engineering,and ***,achieving a balance between the quality and efficiency of high-performance 3D applications and virtual reality(VR)remains *** This study addresses this issue by revisiting and extending view interpolation for image-based rendering(IBR),which enables the exploration of spacious open environments in 3D and ***,we introduce multimorphing,a novel rendering method based on the spatial data structure of 2D image patches,called the image *** this approach,novel views can be rendered with up to six degrees of freedom using only a sparse set of *** rendering process does not require 3D reconstruction of the geometry or per-pixel depth information,and all relevant data for the output are extracted from the local morphing cells of the image *** detection of parallax image regions during preprocessing reduces rendering artifacts by extrapolating image patches from adjacent cells in *** addition,a GPU-based solution was presented to resolve exposure inconsistencies within a dataset,enabling seamless transitions of brightness when moving between areas with varying light *** Experiments on multiple real-world and synthetic scenes demonstrate that the presented method achieves high"VR-compatible"frame rates,even on mid-range and legacy hardware,*** achieving adequate visual quality even for sparse datasets,it outperforms other IBR and current neural rendering *** Using the correspondence-based decomposition of input images into morphing cells of 2D image patches,multidimensional image morphing provides high-performance novel view generation,supporting open 3D and VR ***,the handling of morphing artifacts in the parallax image regions remains a topic for future resea
Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)*** tracking using UAVs is among the most important services provided by a *** this paper,w...
详细信息
Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)*** tracking using UAVs is among the most important services provided by a *** this paper,we studied the periodic crowd-tracking(PCT)*** consists in usingUAVs to follow-up crowds,during the life-cycle of an open crowded area(OCA).Two criteria were considered for this *** first is related to the CMA initial investment,while the second is to guarantee the quality of service(QoS).The existing works focus on very specified assumptions that are highly committed to CMAs applications *** study outlined a new binary linear programming(BLP)model to optimally solve the PCT motivated by a real-world application study taking into consideration the high level of *** closely approach different real-world contexts,we carefully defined and investigated a set of parameters related to the OCA characteristics,behaviors,and theCMAinitial infrastructure investment(e.g.,UAVs,charging stations(CSs)).In order to periodically update theUAVs/crowds andUAVs/CSs assignments,the proposed BLP was integrated into a linear algorithm called PCTs *** main objective was to study the PCT problem fromboth theoretical and numerical *** prove the PCTs solver effectiveness,we generated a diversified set of PCTs instances with different scenarios for simulation *** empirical results analysis enabled us to validate the BLPmodel and the PCTs solver,and to point out a set of new challenges for future research directions.
With the digital transformation, life started depending on the digital world. Hence, there is a massive amount of unstructured textual data produced and accumulated faster. Such data used in many applications such sen...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
暂无评论