This study introduces a deep learning-based method for classifying brain tumors using a pre-trained VGG19 convolutional neural network (CNN). By leveraging transfer learning, we adapted the VGG19 model with custom ful...
详细信息
Heart Disease or Cardiovascular Disease refers to the range of heart conditions like cardiac arrest, coronary artery disease. Heart disease can be very well hindered through certain lifestyle changes. There is a signi...
详细信息
Deepfake images are generated by modifying existing visuals and are frequently exploited in harmful ways. When executed proficiently, these images can be almost indistinguishable from authentic ones. The increasing de...
详细信息
Urban traffic congestion poses a major challenge, particularly for emergency services like ambulances, where delays can have life-threatening consequences. This paper proposes a novel, cost-efficient Automated Traffic...
详细信息
Social media platforms have become essential tools for communication, collaboration, and exchanging information, ideas, and knowledge among users worldwide. Despite their benefits, the anonymity offered by these platf...
详细信息
ISBN:
(数字)9798350372892
ISBN:
(纸本)9798350372908
Social media platforms have become essential tools for communication, collaboration, and exchanging information, ideas, and knowledge among users worldwide. Despite their benefits, the anonymity offered by these platforms has unfortunately led to a rise in hate speech and cyberbullying, causing concern across the globe. This issue has drawn the attention of researchers and scholars now focused on devising methods for automatically detecting cyberaggression and hate speech. The goal is to mitigate these harmful behaviors and create safer online environments [1]. This study specifically aims to identify and analyze the usage of cyberbullying language within the English Tweet corpus, focusing on distinguishing between bullying and non-bullying language. This research contributes to developing more effective cyberbullying detection models by examining the frequency and patterns of cyberbullying words. These findings are vital for enhancing the efficacy of cyberbullying detection on social networks in future research efforts. The conclusions of the experiments indicate that the SVM achieved the highest average accuracy, approximately $84 \%$.
This paper explores the challenge of maintaining performance in single-image dept. estimation when faced with hardware limitations. While most existing studies concentrate on improving accuracy, hardware efficiency is...
详细信息
ISBN:
(数字)9798350386844
ISBN:
(纸本)9798350386851
This paper explores the challenge of maintaining performance in single-image dept. estimation when faced with hardware limitations. While most existing studies concentrate on improving accuracy, hardware efficiency is often disregarded. To tackle this issue, we combine the YOLOv7 and Zoedept. models to create a model that preserves accuracy while reducing the number of parameters. The model was evaluated on the KITTI and NYU dept. v2 datasets, achieving similar accuracy to Zoedept. despite drastically reducing the number of model parameters.
With the rapid development of technology, the use of social media by the public, especially among young people, is increasing. One of the social media platforms currently used by young people is the TikTok application...
详细信息
Re-identification has become a crucial issue in computer vision today as it allows for tracking objects in both continuous and discontinuous scenarios. Despite achieving perfect detection results, anchor-based tracker...
Re-identification has become a crucial issue in computer vision today as it allows for tracking objects in both continuous and discontinuous scenarios. Despite achieving perfect detection results, anchor-based trackers encountered difficulties in effectively learning re-identification features, due to various issues. This research proposes strategies aimed at improving the capability of anchor-based trackers to learn high-quality re-identification (re-ID) features. The model developed through our strategies can extract more distinct features and achieve almost 0.57 Multiple Object Tracking Accuracy (MOTA) on MOT20, even under a limited training dataset. This result indicates that our proposed strategies hold potential for improving the performance of anchor-based trackers.
This paper proposes the use of Random Linear Network Coding (RLNC) as an erasure code in the forward error correction (FEC) mechanism for Internet telephony. It also designs and implements a forward error correction a...
详细信息
ISBN:
(数字)9798331530099
ISBN:
(纸本)9798331530105
This paper proposes the use of Random Linear Network Coding (RLNC) as an erasure code in the forward error correction (FEC) mechanism for Internet telephony. It also designs and implements a forward error correction algorithm applied to the Real-time Transport Protocol (RTP), which we call Adaptive Systematic RLNC (AS-RLNC). The algorithm learns the current packet loss rate of the network through the Real-time Transport Control Protocol (RTCP) and dynamically adjusts the number of redundant packets sent. Compared with traditional forward error correction methods based on block codes, this approach can enhance the reliability of data transmission and improve audio quality by 31%.
Server less cloud computing has won vast recognition in current years because of its capability to provide green and price-effective solutions for numerous computing needs. On this model, cloud carriers manage the sca...
详细信息
暂无评论