Intrusion Detection System (IDS) must be developed based on latest live traffic dataset. This will facilitate the study on new attributes of current threat. Once again, researchers are locked on the same vicious circl...
详细信息
The paper describes the energy consumption from the battery based on the current measurements for various cases, i.e., speed (PWL adjustment) and loads. The main purpose of the research is to have additional and relia...
详细信息
Throughout the evolution of humankind, devising effective crime prevention strategies has been a concern in fostering safer communities. Although achieving a zero-crime rate is not possible yet, using data management ...
详细信息
ISBN:
(数字)9798331517878
ISBN:
(纸本)9798331517885
Throughout the evolution of humankind, devising effective crime prevention strategies has been a concern in fostering safer communities. Although achieving a zero-crime rate is not possible yet, using data management methods can contribute to preventing and minimizing crimes. This article presents an integrated approach to proactive crime prevention. Data insights derived from analysis and visualization provide a comprehensive overview of historical trends and scenarios, aiding understanding of past and present situations. The forecasting of crime rates extends this comprehension to the future, spotlighting the severity of the potential threat to the safety of the community. Three distinct prediction models are presented to predict the occurrence of violent/non-violent crimes, the most probable crime type, and the most probable crime location in a spatial-temporal context, facilitating optimal resource allocation of police patrolling. Combining these three analytical components, an application is designed to present this holistic solution for effective crime prevention, with a 73% accuracy in predicting violent crimes. To achieve higher accuracy in predicting the most probable crime types and locations, it is essential to go beyond spatiotemporal context and augment data on other factors that affect the occurrence of crimes.
Precision medicine aims to provide personalized therapies by analyzing patient molecular profiles, often focusing on gene expression data. However, effectively linking these data to actionable drug discovery for clini...
详细信息
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is *** secure data in these transmitted data has emerged broad security issue,such as authentication and copyright **...
详细信息
Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is *** secure data in these transmitted data has emerged broad security issue,such as authentication and copyright *** the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based *** address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and *** secret data are embedded into the smooth blocks by using a simple replacement *** proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)*** secret data are embedded into the complex blocks by using a hidden *** the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret *** experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods.
We present a laser light scattering study using image classification techniques on simulated cell model patterns for label-free cytometry development. Simulation parameters include mitochondria number, surface roughne...
详细信息
Heart Disease (HD) is the world's most serious illness that seriously impacts human life. The heart does not push blood to other areas of the body in cardiac disease. For the prevention and treatment of cardiac fa...
详细信息
Vision-language models (VLMs) have emerged as formidable tools, showing their strong capability in handling various open-vocabulary tasks in image recognition, text-driven visual content generation, and visual chatbot...
详细信息
Vision-language models (VLMs) have emerged as formidable tools, showing their strong capability in handling various open-vocabulary tasks in image recognition, text-driven visual content generation, and visual chatbots, to name a few. In recent years, considerable efforts and resources have been devoted to adaptation methods for improving the downstream performance of VLMs, particularly on parameter-efficient fine-tuning methods like prompt learning. However, a crucial aspect that has been largely overlooked is the confidence calibration problem in fine-tuned VLMs, which could greatly reduce reliability when deploying such models in the real world. This paper bridges the gap by systematically investigating the confidence calibration problem in the context of prompt learning and reveals that existing calibration methods are insufficient to address the problem, especially in the open-vocabulary setting. To solve the problem, we present a simple and effective approach called Distance-Aware Calibration (DAC), which is based on scaling the temperature using as guidance the distance between predicted text labels and base classes. The experiments with 7 distinct prompt learning methods applied across 11 diverse downstream datasets demonstrate the effectiveness of DAC, which achieves high efficacy without sacrificing the inference speed. Our code is available at https://***/mlstat-Sustech/CLIP Calibration. Copyright 2024 by the author(s)
With the development of technology, people can now play board games with their electronic devices. Although playing board games is not limited to entity game boards, many people still prefer doing it. Due to the devel...
详细信息
In this study, two deep learning models for automatic tattoo detection were analyzed; a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer le...
详细信息
ISBN:
(数字)9798350364538
ISBN:
(纸本)9798350364545
In this study, two deep learning models for automatic tattoo detection were analyzed; a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer learning with fine-tuning. The purpose of this study was to evaluate the accuracy, precision, recall, F1-score, and computational efficiency of the system being considered. To augment the dataset included 1000 photos that were equally divided between those showing tattoos and those that did not show tattoos. A k-fold cross-validation approach was employed in training and testing the models. Although custom CNNs are effective, utilizing pre-trained ones like ResNet-50 can offer even better outcomes. Specifically, ResNet-50 attained a higher accuracy (0.86 compared to 0.79), precision (0.85 versus 0.78), recall (0.91 against 0.86), and F1-score (0.91 vis-a-vis 0.86) as compared to custom CNNs. In selecting these models for examination, two main motivations were considered. The first motivation is to see whether transfer learning with a pre-trained ResNet-50 model does well when compared with a customized CNN designed specifically for tattoo detection. Secondly,the intent of this study is to know what advantages can be derived from each approach and their demerits too. Furthermore, it seeks to determine if transfer learning can provide an alternative in contrast to the common CNN techniques with regards to precision and computational efficiency. In this research, two models will be evaluated in order to answer the question of what is better for tattoo detection: transfer learning or designing custom architectures.
暂无评论