The intricacy and expansion of statistics in increased care sector will lead to an increase in the application of artificial intelligence (AI). There are several different AI techniques in use today by consumers, heal...
详细信息
ISBN:
(纸本)9798350399264
The intricacy and expansion of statistics in increased care sector will lead to an increase in the application of artificial intelligence (AI). There are several different AI techniques in use today by consumers, health professionals, and sciences companies. Guidelines for care and prognosis, patient and commitment, and organizational chores are the key application areas. Challenges will prevent the work of health professionals from being substantially computerized for a considerable length of time, despite the fact that AI can do healthcare tasks in many instances equally as well or better than people. Ethics issues and the implementation of artificial intelligence in healthcare are also discussed. AI technology is essential for producing effective healthcare applications. The definition of several effective software programmers may help in the growth of the health predictive model. computer vision and cloud services are critical elements for building smart healthcare *** collection and analysis of a wide range of health care data may provide useful insights quickly. Artificial intelligence is also crucial in the process of illness detection and prognosis. This smart and efficient approach may help with early illness diagnosis. Sensors connected through wireless networks make it possible to track the actions of a whole population. Sensors embedded in the human body may aid in the recognition of emotions and facial expressions by using neural networks. There is a plethora of technological implementations that contribute to a more advanced data processing *** primary focus of this research is to determine how effectively various efficient technology's function when used in the development of healthcare prediction models. AI uses a wide variety of sensor-based methods to boost healthcare's efficacy. Another area of study has substantial implications for the healthcare system. To help identify problems in biomedical goods, modelling tools may be pro
Parkinson’s disease (PD) is a debilitating neurodegenerative disease that has severe impacts on an individual’s quality of life. Compared with structural and functional MRI-based biomarkers for the disease, electroe...
详细信息
The low cost and rapid provisioning capabilities have made the cloud a desirable platform to launch complex scientific applications. However, resource utilization optimization is a significant challenge for cloud serv...
详细信息
ISBN:
(纸本)9781450397308
The low cost and rapid provisioning capabilities have made the cloud a desirable platform to launch complex scientific applications. However, resource utilization optimization is a significant challenge for cloud service providers, since the earlier focus is provided on optimizing resources for the applications that run on the cloud, with a low emphasis being provided on optimizing resource utilization of the cloud computing internal processes. Code refactoring has been associated with improving the maintenance and understanding of software code. However, analyzing the impact of the refactoring source code of the cloud and studying its impact on cloud resource usage require further analysis. In this paper, we propose a framework called Unified Regression Modelling (URegM) which predicts the impact of code smell refactoring on cloud resource usage. We test our experiments in a real-life cloud environment using a complex scientific application as a workload. Results show that URegM is capable of accurately predicting resource consumption due to code smell refactoring. This will permit cloud service providers with advanced knowledge about the impact of refactoring code smells on resource consumption, thus allowing them to plan their resource provisioning and code refactoring more effectively.
The present work researches driver drowsiness, which constitutes a huge problem, and can turn into fatal incidents potentially involving the losing of lives, being it while driving in a highway (car, bus, truck, etc.)...
详细信息
Urban traffic management faces significant challenges due to non-compliance with traffic rules, particularly among motorcycle riders. This study introduces an innovative approach employing the YOLOv9 object detection ...
详细信息
ISBN:
(数字)9798350351200
ISBN:
(纸本)9798350351217
Urban traffic management faces significant challenges due to non-compliance with traffic rules, particularly among motorcycle riders. This study introduces an innovative approach employing the YOLOv9 object detection framework to monitor and analyze motorcycle violations at busy intersections in Marrakech. By leveraging advanced machine learning techniques, the study aimed to detect helmet usage, traffic light violations, and assess gender-based differences in violation rates. Data were collected using smartphone cameras at strategic locations during peak traffic times across selected days. The captured video footage was analyzed using the YOLOv9 model, which was pretrained on diverse traffic scenes to enhance its accuracy and reliability in real-time object detection. The findings reveal that the automated system not only aligns closely with manual counting but also offers greater consistency and efficiency. Key results indicated a pronounced gender disparity in violation frequencies and provided insights into the temporal patterns of traffic rule infractions. Moreover, the study highlighted minor discrepancies due to environmental factors, which were systematically addressed to refine the detection process. Contextual factors in interpreting detection results.
Edge enabled Industrial Internet of Things (IIoT) platform is of great significance to accelerate the development of smart industry. However, with the dramatic increase in real-time IIoT applications, it is a great ch...
详细信息
Network clustering tackles the problem of identifying sets of nodes (communities) that have similar connection patterns. However, in many scenarios, nodes also have attributes that are correlated with the clustering s...
Network clustering tackles the problem of identifying sets of nodes (communities) that have similar connection patterns. However, in many scenarios, nodes also have attributes that are correlated with the clustering structure. Thus, network information (edges) and node information (attributes) can be jointly leveraged to design high-performance clustering algorithms. Under a general model for the network and node attributes, this work establishes an information-theoretic criterion for the exact recovery of community labels and characterizes a phase transition determined by the Chernoff-Hellinger divergence of the model. The criterion shows how network and attribute information can be exchanged in order to have exact recovery (e.g., more reliable network information requires less reliable attribute information). This work also presents an iterative clustering algorithm that maximizes the joint likelihood, assuming that the probability distribution of network interactions and node attributes belong to exponential families. This covers a broad range of possible interactions (e.g., edges with weights) and attributes (e.g., non-Gaussian models), as well as sparse networks, while also exploring the connection between exponential families and Bregman divergences. Extensive numerical experiments using synthetic data indicate that the proposed algorithm outperforms classic algorithms that leverage only network or only attribute information as well as state-of-the-art algorithms that also leverage both sources of information. The contributions of this work provide insights into the fundamental limits and practical techniques for inferring community labels on node-attributed networks.
We address the problem of safely coordinating a network of Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network. Such problems can be solved through a combination of tractable optimal control...
We address the problem of safely coordinating a network of Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network. Such problems can be solved through a combination of tractable optimal control problems and Control Barrier Functions (CBFs) that guarantee the satisfaction of all constraints. These solutions can be reduced to a sequence of Quadratic Programs (QPs) which are efficiently solved online over discrete time steps. However, guaranteeing the feasibility of the CBF-based QP method within each discretized time interval requires the careful selection of time steps which need to be sufficiently small. This creates computational requirements and communication rates between agents which may limit the controller’s application to real CAVs. We tackle this limitation by adopting an event-triggered control approach for CAVs such that the next QP is triggered by properly defined events with a safety guarantee. We present a laboratory-scale test bed developed to emulate merging roadways using mobile robots as CAVs. We present results to demonstrate how the event-triggered scheme is computationally efficient and can handle measurement uncertainties and noise compared to time-driven control while guaranteeing safety.
A novel drive system using Magnetic Multiple Spur Gear (MMSG) and multiple high-speed motors is characterized by small size, lightweight, and high efficiency even at high-speed region, it is expected to apply to in-wh...
详细信息
Intrusion Detection systems (IDSs) have been wildly used in various environments to actively detect internal and external attacks with high accuracy. Unfortunately, the traditional IDSs cannot distinguish new or unkno...
详细信息
暂无评论