Deepfake technology, known for its ability to produce convincingly face-swapped videos, presents significant risks to privacy, security, and public trust. Misuse of this technology for spreading misinformation, defama...
详细信息
Traffic management also plays a crucial role in urban planning and development, with pressing challenges related to congestion, safety, and environmental impact. In this study, we proposed a real time traffic control ...
详细信息
With the growing adoption of electric vehicles (EVs) as an eco-friendly and sustainable means of transportation, availability of adequate EV charging infrastructure has become very important. While fixed charging stat...
详细信息
Ridesharing systems have become an important part of urban transportation. At the same time, electric vehicle (EV) adoption is also growing at a fast pace as an eco-friendly and sustainable transportation option. To o...
详细信息
Computed Tomography (CT) is essential in medical diagnostics, providing detailed images of internal structures. Noise and blur introduced during image acquisition can com-promise diagnostic accuracy, especially in low...
详细信息
Exploring influential spreaders and predicting missing links in complex networks is essential for understanding and effectively controlling network dynamics. This paper presents a Graph Convolutional Network (GCN)-bas...
详细信息
Intrusion Detection Systems (IDS) are critical for identifying and mitigating potential security threats within network traffic. However, traditional IDS solutions often struggle with scalability and real-time threat ...
详细信息
Colorectal polyps are benign lesions that develop in the colon and can progress to cancer if left untreated. Clinical observations from medical images are often preferred over computational results due to the lac...
详细信息
Colorectal polyps are benign lesions that develop in the colon and can progress to cancer if left untreated. Clinical observations from medical images are often preferred over computational results due to the lack of trust in the machine learning models, thereby posing serious challenge for the explainability of the results. In order to computationally diagnose colorectal polyps from cancerous images and explain the results, we propose a Layer-wise eXplainable ResUNet++ (LeXNet++) framework for segmentation of the cancerous images, followed by layer-wise explanation of the results. We utilize a publicly accessible dataset that contains of 612 raw images with a resolution of 256×256×3 and an additional 612 clinically annotated and labeled images with a resolution of 256×256×1, which includes the infected region. The LeXNet++ framework comprises of three components—encoder, decoder and the bridge. The encoder and the decoder components each comprise of four layers. Each of the four layers in the encoder and the decoder comprises of 14 and 11 internal sub-layers, respectively. Among the sub-layers of the encoder and the decoder, there are three 3×3 convolutional layers with an additional 3×3 convolution-transpose layer in the decoder. The output of each of the sub-layers has been explained through heatmap generation after each iteration which have been further explained. The encoder and the decoder are connected by the bridge which comprises of three sub-layers. The results obtained from these three sub-layers have also been explained to inculcate trust in the findings. In this study, we have used three models to segment the images, namely UNet, ResUNet, and proposed LeXNet++. LeXNet++ exhibited the best result among the three models in terms of performance;hence, only LeXNet++ was explained layer-wise. Apart from explanation of the results fetched in this study, the performance of the proposed explainable model has been observed to be 2% greater than the existing poly
In the context of Industry 5.0 and human-robot interaction, ensuring the safety of operators by avoiding human errors is crucial. Monitoring vigilance decrement is an essential aspect of this effort, aimed at mitigati...
详细信息
Managing attendance in educational institutions is often a time-consuming and error-prone task, with traditional methods like roll calls or sign-in sheets being inefficient and susceptible to proxy attendance. This pa...
详细信息
暂无评论