Molecular noise and signaling abnormalities in biochemical signaling systems in cells affect signaling events and consequently may alter cellular decision making results. Since unexpected and altered cellular decision...
详细信息
Eyeglasses are not only used to protect our vision and prevent dust from getting into our eyes. Additionally, glass that fits properly can give a person an elegant appearance. However, people often find it difficult t...
Eyeglasses are not only used to protect our vision and prevent dust from getting into our eyes. Additionally, glass that fits properly can give a person an elegant appearance. However, people often find it difficult to choose eyeglasses that fit their face shape; to address this issue, we have proposed a novel architecture in this paper. In order to do this, we created a pipeline that can recommend eyeglasses based on the form of the eyes using multiple transfer learning architecture to predict the face shape from a given image. We utilized InceptionV4 [17], InceptionV3[18], Vit Small [12], DenseNet121 [10], ResNet50 [9], and VGG16 [16] to predict the facial shape from the image and achieve a test accuracy of 75%. We used 5500 photos with five different face shapes (Heart, Oblong, Oval, Round, Square) for this experiment, and two distinct datasets were gathered from Kaggle [2] and GitHub [1]. By simply uploading the photograph to our recommendation system, our proposed solution can assist users in selecting the appropriate eyewear.
Human action recognition in videos is an important task of computer vision that aims to automatically recognize and classify human actions in video sequences. However, accurately recognizing human actions can be chall...
Human action recognition in videos is an important task of computer vision that aims to automatically recognize and classify human actions in video sequences. However, accurately recognizing human actions can be challenging due to the complexity and variability of human motion and appearance. In this paper, we propose ActiViT, a novel approach for human action recognition in videos based on a Transformer architecture. Unlike existing methods that rely on convolutional or recurrent layers, our model is entirely based on the Transformer encoder, enabling us to leverage valuable information in action image patches features. We demonstrate that by dynamically selecting key patches guided by specific human poses, our model learns informative features useful for distinguishing between different actions. Our experimental results on real-world datasets convincingly demonstrate the effectiveness of our model and the importance of selecting discriminative key poses for action recognition.
Knowledge Building as a pedagogy supports collaborative work between students to improve ideas. The result of knowledge-building discourse in student communities is the development of academic artifacts. Student repor...
详细信息
ISBN:
(纸本)9781450397766
Knowledge Building as a pedagogy supports collaborative work between students to improve ideas. The result of knowledge-building discourse in student communities is the development of academic artifacts. Student reports are academic artifacts that can result from a knowledge-building process during their learning. However, the automatic analysis of student reports is quite challenging due to the documents’ length and written language. Given this context, our goal is to analyze the semantic similarity between student reports and curriculum literature using the information coverage measure based on the Skip-gram word2vec model. Word2vec is a well-known set of techniques that provides a way to create a representation of words to predict the nearby words between every word and its context to capture the internal semantic and syntactic information. In this work, through the experimental comparison between the vocabulary list, the best similarity value is 0.90 using word2vec. The results show that each student report was aligned with each document in the curriculum literature using the information coverage measure based on word2vec.
Because of poor blood flow and susceptibility to infections, breast cancer can be challenging to heal and, if not treated, might cause major problems, including limb amputation and a lowered quality of life. Though se...
详细信息
ISBN:
(数字)9798331528829
ISBN:
(纸本)9798331528836
Because of poor blood flow and susceptibility to infections, breast cancer can be challenging to heal and, if not treated, might cause major problems, including limb amputation and a lowered quality of life. Though several systems exist to identify breast cancer, few combine machine learning (ML), deep learning (DL), and optimization strategies. This work presents a novel method leveraging complex algorithms to precisely identify breast cancer from ultrasound images. The study utilizes a dataset from a secondary source, categorizing it into three identical classes: normal (Class 0), benign (Class 1), and malignant (Class 2). It extracts features using pre-trained convolutional neural networks (CNNs), optimizes these features using the Differential Evolution Algorithm (DEA), and classifies images using standard machine learning algorithms. To show how well it detects breast cancer, the approach combines seven conventional ML classifiers with ten pre-trained CNN models. Using DenseNet121 + DEA + Xtreme Gradient Boosting (XGB) Classifier, DEA chooses important features derived by CNNs with a high accuracy of 97.76%. However, the proposed method can be very effective for real-time breast cancer screening using ultrasound images.
Bacteria released from the on-site sewer facilities (OSSFs) elevated fecal bacteria indicators in the Neches River Tidal with increasing flood frequency and intensity. It is necessary to monitor the bacteria levels on...
详细信息
A predictive simulation is built on a conceptual model (e.g., to identify relevant constructs and relationships) and serves to estimate the potential effects of ‘what-if’ scenarios. Developing the conceptual model a...
A predictive simulation is built on a conceptual model (e.g., to identify relevant constructs and relationships) and serves to estimate the potential effects of ‘what-if’ scenarios. Developing the conceptual model and plausible scenarios has long been a time-consuming activity, often involving the manual processes of identifying and engaging with experts, then performing desk research, and finally crafting a compelling narrative about the potential futures captured as scenarios. Automation could speed-up these activities, particularly through text mining. We performed the first review on automation for simulation scenario building. Starting with 420 articles published between 1995 and 2022, we reduced them to 11 relevant works. We examined them through four research questions concerning data collection, extraction of individual elements, connecting elements of insight and (degree of automation of) scenario generation. Our review identifies opportunities to guide this growing research area by emphasizing consistency and transparency in the choice of datasets or methods.
This paper presents a novel fifteen-level two-source inverter topology that is reliable against source outages. The topology has two DC sources, a total of ten switches, and four DC-link capacitors. Level-shifted PWM ...
This paper presents a novel fifteen-level two-source inverter topology that is reliable against source outages. The topology has two DC sources, a total of ten switches, and four DC-link capacitors. Level-shifted PWM is used to generate the required number of levels. Simulations are performed for normal operation as well as for the source outage conditions. The proposed topology is able to generate multi-level output waveform satisfactorily even at the advent of source outages. The simulation results for the source outages are presented for both static and dynamic conditions along with the THD measurements.
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques ...
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques are employed: Linear programming (LP) and particle swarm optimization (PSO). PSO significantly reduces the duration, leading to a reduction in project duration. But the LP algorithm does not improve the project duration. Using suitable algorithms to maximize project efficiency and success is essential for successful project management. This research provides valuable information for project managers and decision makers, highlighting the importance of utilizing suitable algorithms to maximize project efficiency and success.
As applications in IT have been spanning multiple containers across servers, kubernetes is being used extensively for automating software deployment, scaling and management. Kubernetes eases the container tasks and al...
As applications in IT have been spanning multiple containers across servers, kubernetes is being used extensively for automating software deployment, scaling and management. Kubernetes eases the container tasks and also other activities like horizontal scaling and canary development. To run cloud-native applications, kubernetes has become the de facto standard for container orchestration, regardless of the underlying platform. This makes it very crucial to have a disaster recovery plan for kubernetes environments. This paper proposes a system for backup and restore of a kubernetes cluster using the snapshot method along with the Public Key Infrastructure (PKI) certificates of a cluster. It also focuses on automating the backup and restore operations using microservices. Furthermore, it makes use of Amazon Web Services (AWS) tools for the reliability, scalability and the automation of backup and restore operations. The user can run the proposed microservices to backup and restore the cluster from any specific timestamp before the disaster. The experimental results demonstrate the effective performance of the proposed method in terms of efficiently restoring the kubernetes cluster in optimal time.
暂无评论