This study aims to investigate whether physical factors like temperature, humidity, and pressure interact with current in Micro-electromechanical systems (MEMS). To study these interactions, a straightforward system w...
详细信息
As computing education research seeks to be more equitable, it is important to identify the needs of minority groups, like those at Historically Black Colleges and Universities (HBCUs) specifically, and understand how...
详细信息
ISBN:
(数字)9798350328325
ISBN:
(纸本)9798350328332
As computing education research seeks to be more equitable, it is important to identify the needs of minority groups, like those at Historically Black Colleges and Universities (HBCUs) specifically, and understand how these groups are being engaged in learning. Basic data structures are a foundational topic for computing students’ academic advancement and career success. To understand the trends in how data structure topics are being taught at HBCUs through the lens of professors, we conducted semi-structured interviews. These experiences showed that there is promise for a more direct/intentional application of culturally sustaining pedagogy to data structures instruction.
We propose an end-to-end learned image data hiding framework that embeds and extracts secrets in the latent representations of a generic neural compressor. By leveraging a perceptual loss function in conjunction with ...
We propose an end-to-end learned image data hiding framework that embeds and extracts secrets in the latent representations of a generic neural compressor. By leveraging a perceptual loss function in conjunction with our proposed message encoder and decoder, our approach simultaneously achieves high image quality and high bit accuracy. Compared to existing techniques, our framework offers superior image secrecy and competitive watermarking robustness in the compressed domain while accelerating the embedding speed by over 50 times. These results demonstrate the potential of combining data hiding techniques and neural compression and offer new insights into developing neural compression techniques and their applications.
In the current study, FloraNet was used to present an improved method for diagnosing leaf diseases in Sea Buckthorn. In the proposed model, Convolutional Neural Networks (CNN) and Random Forests (RF) are integrated. E...
详细信息
ISBN:
(数字)9798350361155
ISBN:
(纸本)9798350361162
In the current study, FloraNet was used to present an improved method for diagnosing leaf diseases in Sea Buckthorn. In the proposed model, Convolutional Neural Networks (CNN) and Random Forests (RF) are integrated. Essentially, CNN architecture is composed of a pair of convolutional layers, followed by a max-pooling layer; it is then followed by another pair of convolutional layers, before finishing off with a final pair of convolutional layers. Performance indicators such as Precision, Recall, F1-Score, or Accuracy are used to determine the performance of the model in terms of its performance. There were five disorders under investigation: Phakopsora, Erysiphe, Septoria, Colletotrichum, Phoma, as well as viral infections. Overall, the results show that the Micro Average accuracy for all classes is 95.11 %. According to the results, the individual accuracy ranges from 0.98 to 0.99 for each illness, while the F1-Scores range from 94.02% to 95.91% for each illness. This study concludes that the weighted average accuracy of 95.11 demonstrates a high level of proficiency of the model in identifying diseases, and indicates that the model is capable of identifying a wide variety of diseases. By using this integrated approach, agricultural scientists and researchers are able to detect Sea Buckthorn leaf diseases.
In present days, Multi Label Text Classification (MLTC) has become an important research area in Natural Language Processing (NLP). Existing models of MLTC have been facing domain specificity and fine-tuning challenge...
详细信息
ISBN:
(数字)9798350370249
ISBN:
(纸本)9798350370270
In present days, Multi Label Text Classification (MLTC) has become an important research area in Natural Language Processing (NLP). Existing models of MLTC have been facing domain specificity and fine-tuning challenges. Hence a model is developed to overcome the above said challenges by introducing Prompt engineering, GPT FineTuning methods and Pipeline algorithms. The experimental results are obtained based on the present Generative pre trained data produces labels for various text documents and files with an exceptional accuracy of 85%. The outcomes of the experiments reveal notable enhancements over the baseline models.
Recently, many companies are relying on Natural Language Processing (NLP) techniques to understand the text data generated daily. It has become very critical to deal with this data because finding the sentiments of te...
Recently, many companies are relying on Natural Language Processing (NLP) techniques to understand the text data generated daily. It has become very critical to deal with this data because finding the sentiments of text and summarizing them will help the company understand the pain points of the customers posting reviews on social media or understand the experience of the customer. These requirements have increasingly demanded many advanced algorithms to deal the text data. The introduction of Transformers led to businesses adopting NLP methods more and more to keep up with their needs. Models like Bidirectional Encoder Representations from Transformers (BERT) and Generative Pre-trained Transformers (GPT), state-of-the-art results were achieved with billions of parameters learned. Although these advancements improved the accuracy and expanded the use of algorithms to a wide range of NLP tasks like language translation, text summarization, and language modeling. Businesses are more interested in the Explainability of the model compared to its accuracy. Explainable Artificial Intelligence (XAI) plays an important role to comprehend the complexities of the model as well as the influence of weights on predictions. In this paper, the complexities of the transformer model are unraveled by presenting a straightforward method for computing explainable predictions. The DistilBERT model is chosen as an example to implement the explainable system due to its lighter nature. Combining the strengths of a Posthoc expla-nation with those of a self-learning neural network, the method makes it simple to scale it to other algorithms to implement. With technologies like python, PyTorch, and Hugging Face, a detailed step-by-step algorithmic computation is demonstrated to explain the predictions from the attention-based explanations.
In recent years, self-training has become more and more popular in model learning because it only requires a small amount of labeled data to reach high classification accuracy. Since the conventional self-training doe...
In recent years, self-training has become more and more popular in model learning because it only requires a small amount of labeled data to reach high classification accuracy. Since the conventional self-training does not perform in a class-specific manner, class imbalance problem happens frequently as self-training tends to select more pseudo labeled samples from easy classes. It becomes even worse when training dataset is originally class-imbalanced. In this paper, classwise self-paced self-training is proposed to solve this problem. A classwise pseudo-labeling method ensures that sufficient data are selected for each class in a self-pace manner. To avoid increasing number of noisy samples, two indicators, confidence score and uncertainty score, are proposed based on dropout prediction for noisy label filtering. Experimental results demonstrate that the proposed method achieves very competitive performance on CIFAR-10 and ISIC2018 datasets. Keyword: Deep Learning, Image Classification, Semi-Supervised Learning, Self-Training
The amount of data loss on corporate servers in cloud environments has increased significantly. In the cloud, there are many security compromises and account hijackings, resulting in severe vulnerabilities for the ser...
详细信息
This paper presents a security system that uses the built-in Virtual Private Networks (VPN) mechanism on Android to monitor the Uniform Resource Locators (URLs) linked to when apps are executed. Then, the proposed sys...
This paper presents a security system that uses the built-in Virtual Private Networks (VPN) mechanism on Android to monitor the Uniform Resource Locators (URLs) linked to when apps are executed. Then, the proposed system sends the URLs to VirusTotal, a third-party security website for evaluation. Finally, the security score of each URL is presented to the smartphone user, providing them the choice to decide whether to remove an app with security concerns.
The ever-growing mountain of e-waste, fueled by short-lived batteries, threatens our planet's security. Discarded batteries leach toxic materials, jeopardizing environmental health and safety. This escalating cris...
详细信息
暂无评论