This study aimed to create a mobile application to promote and guide the cultural tourism attraction Phra That Nine Choms in Chiang Rai Province, Thailand. The critical information about Phra That Nine Choms is gather...
详细信息
Sign language includes the motion of the arms and hands to communicate with people with hearing *** models have been available in the literature for sign language detection and classification for enhanced *** the late...
详细信息
Sign language includes the motion of the arms and hands to communicate with people with hearing *** models have been available in the literature for sign language detection and classification for enhanced *** the latest advancements in computer vision enable us to perform signs/gesture recognition using deep neural *** paper introduces an Arabic Sign Language Gesture Classification using Deer Hunting Optimization with Machine Learning(ASLGC-DHOML)*** presented ASLGC-DHOML technique mainly concentrates on recognising and classifying sign language *** presented ASLGC-DHOML model primarily pre-processes the input gesture images and generates feature vectors using the densely connected network(DenseNet169)*** gesture recognition and classification,a multilayer perceptron(MLP)classifier is exploited to recognize and classify the existence of sign language ***,the DHO algorithm is utilized for parameter optimization of the MLP *** experimental results of the ASLGC-DHOML model are tested and the outcomes are inspected under distinct *** comparison analysis highlighted that the ASLGC-DHOML method has resulted in enhanced gesture classification results than other techniques with maximum accuracy of 92.88%.
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors...
详细信息
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors,as well as confirming the absence of tumors,poses a significant challenge using MRI *** approaches predominantly rely on traditional machine learning and basic deep learning methods for image *** methods often rely on manual feature extraction and basic convolutional neural networks(CNNs).The limitations include inadequate accuracy,poor generalization of new data,and limited ability to manage the high variability in MRI *** the EfficientNetB3 architecture,this study presents a groundbreaking approach in the computational engineering domain,enhancing MRI-based brain tumor *** approach highlights a major advancement in employing sophisticated machine learning techniques within computer Science and Engineering,showcasing a highly accurate framework with significant potential for healthcare *** model achieves an outstanding 99%accuracy,exhibiting balanced precision,recall,and F1-scores across all tumor types,as detailed in the classification *** successful implementation demonstrates the model’s potential as an essential tool for diagnosing and classifying brain tumors,marking a notable improvement over current *** integration of such advanced computational techniques in medical diagnostics can significantly enhance accuracy and efficiency,paving the way for wider *** research highlights the revolutionary impact of deep learning technologies in improving diagnostic processes and patient outcomes in neuro-oncology.
In recent years,cloud computing has provided a Software As A Service(SaaS)platform where the software can be reused and applied to fulfill compli-cated user demands according to specific Quality of Services(QoS)*** user...
详细信息
In recent years,cloud computing has provided a Software As A Service(SaaS)platform where the software can be reused and applied to fulfill compli-cated user demands according to specific Quality of Services(QoS)*** user requirements are formulated as a workflow consisting of a set of ***,many services may satisfy the functionality of each task;thus,searching for the composition of the optimal service while maximizing the QoS is formulated as an NP-hard *** work will introduce a hybrid Artificial Bee Colony(ABC)with a Cuckoo Search(CS)algorithm to untangle service composition *** ABC is a well-known metaheuristic algorithm that can be applied when dealing with different NP-hard problems with an outstanding record of ***,the ABC suffers from a slow convergence ***,the CS is used to overcome the ABC’s limitations by allowing the abandoned bees to enhance their search and override the local *** proposed hybrid algorithm has been tested on 19 datasets and then compared with two standard algorithms(ABC and CS)and three state-of-the-art swarm-based composition *** addition,extensive parameter study experiments were conducted to set up the proposed algorithm’s *** results indicate that the proposed algorithm outperforms the standard algorithms in the three comparison criteria(bestfitness value,averagefitness value,and average execution time)overall datasets in 30 different ***,the proposed algorithm also exhibits better performance than the state–of–the–art algorithms in the three comparison criteria over 30 different runs.
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple *** have shut their borders,and their nationals have been advised to *** variety...
详细信息
The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple *** have shut their borders,and their nationals have been advised to *** variety of responses to the pandemic has given rise to data privacy *** prevention and control strategies as well as disease control measures,especially real-time contact tracing for COVID-19,require the identification of people exposed to *** tracing frameworks use mobile apps and geolocations to trace ***,while the motive may be well intended,the limitations and security issues associated with using such a technology are a serious cause of *** are growing concerns regarding the privacy of an individual’s location and personal identifiable information(PII)being shared with governments and/or health *** study presents a real-time,trust-based contact-tracing framework that operateswithout the use of an individual’sPII,location sensing,or gathering GPS *** focus of the proposed contact tracing framework is to ensure real-time privacy using the Bluetooth range of individuals to determine others within the *** research validates the trust-based framework using Bluetooth as practical and *** our proposed methodology,personal information,health logs,and location data will be secure and not *** research analyzes 100,000 tracing dataset records from 150 mobile devices to identify infected users and active users.
Handwritten digit recognition is a significant challenge in the field of machine learning, particularly for pattern recognition and computer vision applications. It has found applications in various areas, such as ide...
详细信息
In the digital era, people use e-mail as the primary means of communication, as well as credentials and private communication in their work. Sending fake e-mails is usually illegal and aims to steal data or implant ma...
详细信息
Social media platforms, such as Twitter, have become powerful sources of information on people's perception of major events. Many people use Twitter to express their views on various issues and events and use it t...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images r...
详细信息
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images reflecting a highly challenging and unconstraint *** methodology for building the dataset consists of four core phases;that include acquisition of videos,extraction of frames,localization of face regions,and cropping and resizing of detected face *** raw images in the dataset consist of a total of 4613 frames obtained fromvideo *** processed images in the dataset consist of the face regions of 250 persons extracted from raw data images to ensure the authenticity of the presented *** dataset further consists of 8 images corresponding to each of the 250 subjects(persons)for a total of 2000 *** portrays a highly unconstrained and challenging environment with human faces of varying sizes and pixel quality(resolution).Since the face regions in video sequences are severely degraded due to various unavoidable factors,it can be used as a benchmark to test and evaluate face detection and recognition algorithms for research *** have also gathered and displayed records of the presence of subjects who appear in presented frames;in a temporal *** can also be used as a temporal benchmark for tracking,finding persons,activity monitoring,and crowd counting in large crowd scenarios.
暂无评论