Face emotion recognition is an important subject in fields such as psychology and cognitive sciences, as well as in applications that use machine learning methods to create intelligent models capable of understanding ...
详细信息
ISBN:
(数字)9798350395440
ISBN:
(纸本)9798350395457
Face emotion recognition is an important subject in fields such as psychology and cognitive sciences, as well as in applications that use machine learning methods to create intelligent models capable of understanding human behavior. This paper addresses the challenge of negative facial emotion recognition by employing a comprehensive framework. Our approach leverages 68 facial landmarks and integrates three pre-trained convolutional neural network models (VGG19, DenseNet201, Inception V3) into a unified weighted voting system. The efficacy of our system is evaluated using the Extended Cohn-Kanade (CK+) and Karolinska Directed Emotional Faces (KDEF) databases. The results showcase the effectiveness of our approach in accurately identifying negative facial emotions. This research contributes to the advancement of emotion recognition systems., offering a promising methodology with implications for fields such as psychology., cognitive sciences., and the broader spectrum of intelligent systems reliant on facial expression analysis.
Accurate plant detection is an important task in modern precision agriculture, enabling growers to quantify their plant numbers and estimate crop yields accurately. This paper looks at an example tobacco crop with a s...
详细信息
ISBN:
(数字)9798350364293
ISBN:
(纸本)9798350364309
Accurate plant detection is an important task in modern precision agriculture, enabling growers to quantify their plant numbers and estimate crop yields accurately. This paper looks at an example tobacco crop with a small dataset and aims to augment it to produce reliable object detection and counting. To obtain a trainable dataset, the source masks are separated into base classes, noise is removed from the masks, and images are augmented. The newly obtained clean dataset is then split into patches and used to obtain a JSON file describing all the labels present in the image. The model used for this job is YOLOv8 and it is trained on a COCO-formatted augmented dataset. Choosing the proper set of weights is done by evaluating and studying the performance metrics over the whole training phase, picking the one that offers the greatest balance between performance, training duration, and risk of induced overfitting due to over-learning.
This paper reviews the problems encountered with data sets recorded by IoT monitoring networks and proposes five data healing methods. The five proposed methods include classic approaches but also methods based on art...
详细信息
ISBN:
(数字)9798331532147
ISBN:
(纸本)9798331532154
This paper reviews the problems encountered with data sets recorded by IoT monitoring networks and proposes five data healing methods. The five proposed methods include classic approaches but also methods based on artificial intelligence algorithms for predicting values. Using a case study based on indoor air quality research, the performances of the five methods of filling the gaps in the recorded data are explored both from the point of view of the ease of evaluation and visualization of the data and from the point of view of the statistical properties of the series of values.
Digital pathology allows for the efficient storage and advanced computational analysis of stained histopathological slides of various tissues. Tissue segmentation is a crucial first step of digital pathology aimed at ...
详细信息
Drones have become common devices that are increasingly used, from toy mini drones to very advanced autonomous flying platforms used in various industries. The safety of using engineering structures and the need to sh...
详细信息
The automatic recognition of real people is particularly important in many fields of activity. The article proposes a complex system for recognizing people taking into account possible fraud attacks. A Long Short-Term...
详细信息
ISBN:
(数字)9798331518493
ISBN:
(纸本)9798331518509
The automatic recognition of real people is particularly important in many fields of activity. The article proposes a complex system for recognizing people taking into account possible fraud attacks. A Long Short-Term Memory neural network was used to detect possible frauds in the video sequences, and to recognize the person in the case after validation as a real person, two Siamese neural networks implemented with VGG 16 and ResNet 50 were tested. The obtained results were compared for Euclidean distance, Cosine distance, and for two training methods: Contrastive Loss and Triple Loss. The best results were obtained for VGG 16, Cosine distance, and Triple Loss.
One of the most important applications of UAVs is person detection for security or rescue tasks. The goal of the proposed paper is to develop, experiment, and compare the performance of two new neural networks based o...
详细信息
ISBN:
(数字)9798350369441
ISBN:
(纸本)9798350369458
One of the most important applications of UAVs is person detection for security or rescue tasks. The goal of the proposed paper is to develop, experiment, and compare the performance of two new neural networks based on the transformer architecture, Detection Transformer and Vision Transformer. Two datasets were used, an own one for testing and COCO for learning. The results are promising to take into account the difficulties of person detection at a distance.
The work presented in this paper highlights the ability of state-of-the-art Large Language Models to generate sarcasm. In the recent months, ChatGPT has become increasingly popular and has started a new wave of intere...
详细信息
The paper presents a solution for an irrigation controller based on the fuzzy-logic methodology. First, it describes the general problem of irrigation. Then, it discusses the physical control model. The precious irrig...
详细信息
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicate...
详细信息
暂无评论