This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients(GFCC)for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hun...
详细信息
This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients(GFCC)for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network(DHO-ANN).The noisy crowdsourced cough datasets were collected from the public *** research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech *** proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures,F1 score,confusion matrix,specificity,and sensitivity ***,it is found that the proposed algorithm using GFCC performs well in terms of detecting the COVID-19 disease from the noisy crowdsourced cough dataset,***,the proposed algorithm and undertaken feature parameters have improved the detection of COVID-19 by 5%compared to the existing methods.
Autism spectrum disorder(ASD)is regarded as a neurological disorder well-defined by a specific set of problems associated with social skills,recurrent conduct,and *** ASD as soon as possible is favourable due to prior...
详细信息
Autism spectrum disorder(ASD)is regarded as a neurological disorder well-defined by a specific set of problems associated with social skills,recurrent conduct,and *** ASD as soon as possible is favourable due to prior identification of ASD permits prompt interferences in children with *** of ASD related to objective pathogenicmutation screening is the initial step against prior intervention and efficient treatment of children who were ***,healthcare and machine learning(ML)industries are combined for determining the existence of various *** article devises a Jellyfish Search Optimization with Deep Learning Driven ASD Detection and Classification(JSODL-ASDDC)*** goal of the JSODL-ASDDC algorithm is to identify the different stages of ASD with the help of biomedical *** proposed JSODLASDDC model initially performs min-max data normalization approach to scale the data into uniform *** addition,the JSODL-ASDDC model involves JSO based feature selection(JFSO-FS)process to choose optimal feature ***,Gated Recurrent Unit(GRU)based classification model is utilized for the recognition and classification of ***,the Bacterial Foraging Optimization(BFO)assisted parameter tuning process gets executed to enhance the efficacy of the GRU *** experimental assessment of the JSODL-ASDDC model is investigated against distinct *** experimental outcomes highlighted the enhanced performances of the JSODL-ASDDC algorithm over recent approaches.
This research work focuses on food recognition, especially, the identification of the ingredients from food images. Here, the developed model includes two stages namely: 1) feature extraction;2) classification. Initia...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing works on Arabic ABSA content separately address them,assume that aspect terms are preidentified,or use a pipeline *** solutions design different models for each task,and the output from the ATE model is used as the input to the APC model,which may result in error propagation among different steps because APC is affected by ATE *** methods are impractical for real-world scenarios where the ATE task is the base task for APC,and its result impacts the accuracy of ***,in this study,we focused on a multi-task learning model for Arabic ATE and APC in which the model is jointly trained on two subtasks simultaneously in a *** paper integrates themulti-task model,namely Local Cotext Foucse-Aspect Term Extraction and Polarity classification(LCF-ATEPC)and Arabic Bidirectional Encoder Representation from Transformers(AraBERT)as a shred layer for Arabic contextual text *** LCF-ATEPC model is based on a multi-head selfattention and local context focus mechanism(LCF)to capture the interactive information between an aspect and its ***,data augmentation techniques are proposed based on state-of-the-art augmentation techniques(word embedding substitution with constraints and contextual embedding(AraBERT))to increase the diversity of the training *** paper examined the effect of data augmentation on the multi-task model for Arabic *** experiments were conducted on the original and combined datasets(merging the original and augmented datasets).Experimental results demonstrate that the proposed Multi-task model outperformed existing APC *** results were obtained by AraBERT and LCF-ATEPC with fusion layer(AR-LCF-ATEPC-Fusion)and the proposed data augmentation
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref...
详细信息
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;therefore,theuse of anauto-encoder for compressionbefore encodingwill solve such a *** this paper,we use an auto-encoder to compress amedical image before encryption,and an encryption output(vector)is sent out over the *** the other hand,a decoder was used to reproduce the original image back after the vector was received and *** convolutional neural networks were conducted to evaluate our proposed approach:The first one is the auto-encoder,which is utilized to compress and encrypt the images,and the other assesses the classification accuracy of the image after decryption and *** hyperparameters of the encoder were tested,followed by the classification of the image to verify that no critical information was lost,to test the encryption and encoding *** this approach,sixteen hyperparameter permutations are utilized,but this research discusses three main cases in *** first case shows that the combination of Mean Square Logarithmic Error(MSLE),ADAgrad,two layers for the auto-encoder,and ReLU had the best auto-encoder results with a Mean Absolute Error(MAE)=0.221 after 50 epochs and 75%classification with the best result for the classification *** second case shows the reflection of auto-encoder results on the classification results which is a combination ofMean Square Error(MSE),RMSprop,three layers for the auto-encoder,and ReLU,which had the best classification accuracy of 65%,the auto-encoder gives MAE=0.31 after 50 *** third case is the worst,which is the combination of the hinge,RMSprop,three layers for the auto-encoder,and ReLU,providing accuracy of 20%and MAE=0.485.
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of p...
详细信息
During the COVID-19 crisis, the need to stay at home has increased dramatically. In addition, the number of sickpeople, especially elderly persons, has increased exponentially. In such a scenario, home monitoring of patientscan ensure remote healthcare at home using advanced technologies such as the Internet of Medical Things (IoMT).The IoMT can monitor and transmit sensitive health data;however, it may be vulnerable to various attacks. In thispaper, an efficient healthcare security system is proposed for IoMT applications. In the proposed system, themedical sensors can transmit sensed encrypted health data via a mobile application to the doctor for ***, three consortium blockchains are constructed for load balancing of transactions and reducing transactionlatency. They store the credentials of system entities, doctors' prescriptions and recommendations according to thedata transmitted via mobile applications, and the medical treatment process. Besides, cancelable biometrics areused for providing authentication and increasing the security of the proposed medical system. The investigationalresults show that the proposed system outperforms existing work where the proposed model consumed lessprocessing time by values of 18%, 22%, and 40%, and less energy for processing a 200 KB file by values of 9%,13%, and 17%. Finally, the proposed model consumed less memory usage by values of 7%, 7%, and 18.75%. Fromthese results, it is clear that the proposed system gives a very reliable and secure performance for efficientlysecuring medical applications.
This work provides a basis for studying energy management optimisation in power-split hybrid electric vehicles (PSHEVs) to reduce fuel consumption and increase powertrain efficiency by enforcing a strategy related to ...
详细信息
Hearing and Speech impairment can be congenital or *** and speech-impaired students often hesitate to pursue higher education in reputable institutions due to their ***,the development of automated assistive learning ...
详细信息
Hearing and Speech impairment can be congenital or *** and speech-impaired students often hesitate to pursue higher education in reputable institutions due to their ***,the development of automated assistive learning tools within the educational field has empowered disabled students to pursue higher education in any field of *** learning devices enable students to access institutional resources and facilities *** proposed assistive learning and communication tool allows hearing and speech-impaired students to interact productively with their teachers and *** tool converts the audio signals into sign language videos for the speech and hearing-impaired to follow and converts the sign language to text format for the teachers to *** educational tool for the speech and hearing-impaired is implemented by customized deep learning models such as Convolution neural networks(CNN),Residual neural Networks(ResNet),and stacked Long short-term memory(LSTM)network *** assistive learning tool is a novel framework that interprets the static and dynamic gesture actions in American Sign Language(ASL).Such communicative tools empower the speech and hearing impaired to communicate effectively in a classroom environment and foster *** deep learning models were developed and experimentally evaluated with the standard performance *** model exhibits an accuracy of 99.7% for all static gesture classification and 99% for specific vocabulary of gesture action *** two-way communicative and educational tool encourages social inclusion and a promising career for disabled students.
In many construction projects,a proactive slope stability evaluation is a *** many deterministic or non-deterministic approaches have been commonly used,metaheuristic approaches have resulted in high precision and sig...
详细信息
In many construction projects,a proactive slope stability evaluation is a *** many deterministic or non-deterministic approaches have been commonly used,metaheuristic approaches have resulted in high precision and significant outcomes for slope stability analysis *** current work focuses on the reliable assessment of critical failure surfaces associated with the least factor of safety value in both homogeneous and non-homogeneous slopes using a new simplified meta-heuristic approach called optics-inspired optimization(OIO).The algorithm utilizes six different LEM methods as a fitness function for deriving the factor of *** analysis over three benchmark studies has been performed to demonstrate the algorithm's robustness and *** implementation found more robust results as compared to previous ***,the algorithm's statistical implication is conducted using the ANOVA test,which inferred better *** this interpretation,the approach claims to be suitable and efficient for slope stability analysis.
Wireless Sensor Networks (WSNs) play an important role in the modern era and security has become an important research area. Intrusion Detection System (IDS) improve network security by monitoring the network state so...
详细信息
暂无评论