This study introduces a unique cancelable face recognition technique that depends on adaptive filters and quaternion mathematics. The whale optimization is also applied to determine the optimal parameter settings for ...
This study introduces a unique cancelable face recognition technique that depends on adaptive filters and quaternion mathematics. The whale optimization is also applied to determine the optimal parameter settings for best performance. The primary concept of the suggested model revolves around the concealment of facial characteristics before their utilization in the face recognition process. The primary aim of this procedure is to guarantee the confidentiality of users' personal information throughout the enrollment and verification stages of the biometric system, particularly when the database is compromised and the stored biometric templates are altered. In this context, the color facial image is utilized to construct a quaternion. After that, a mask image is employed in a separate quaternion. The cancelable templates are obtained by using the input and mask images represented in quaternion format and applying an adaptive filter on both of them. This process involves preserving the weights of the adaptive filter. Investigation of the suggested tehnique performance demonstrates that the obtained templates lead to low (EER) and a large Area under the ROC curve.
Deep convolution networks have quickly established itself as the main method for deciphering medical pictures due to their widespread use. This extensive study examined almost 300 recent papers, mostly from the preced...
Deep convolution networks have quickly established itself as the main method for deciphering medical pictures due to their widespread use. This extensive study examined almost 300 recent papers, mostly from the preceding year, that summarized the basic artificial intelligence ideas related to medical picture analysis. Applications of deep learning were explored in detail in a number of disciplines, including object recognition, picture grouping, classification, and registering. This book presents a succinct summary of studies conducted in the fields of neurological disorders, retinal cells, asthma, malignant scans, breasts, cardiovascular and cardiac pelvic, and nerve imaging. Study conducted concludes our assessment with a review of the state-of-the-art at this time, a thorough investigation of outstanding problems, and suggestions for further research. All areas, including computerized pathology, musculoskeletal, pulmonary, the heart, breasts, muscles and tendons, retinal, and neurology imaging, are summarized in a summary of current studies. This thorough review ends with an assessment of the field's current state, a critical analysis of ongoing issues, and specific suggestions for further research and development.
Recruitment in most organizations is normally a rather inefficient process where it takes quite a long time to match the right candidate to a given job. In this research, AI-based hiring system is recommended to impro...
详细信息
ISBN:
(数字)9798331543624
ISBN:
(纸本)9798331543631
Recruitment in most organizations is normally a rather inefficient process where it takes quite a long time to match the right candidate to a given job. In this research, AI-based hiring system is recommended to improve the efficiency and accuracy of the hiring process with the help of NLP and machine learning algorithms. Employment enabling processes such as CV filtering, skill evaluation and personality profiling as well as job matching are achieved by the system. An NLP-based tool is used for short listing of CVs, assessment quizzes are used to evaluate different skills and qualifications of the candidates and chatbot enables communication between candidates and HRs, while an AI bot is used to complete different document verifications' processes. Recruitment operation is made easier and efficient, and matching of candidates to the available jobs is done better since it is less time-consuming and energy-demanding, giving a solution that may be implemented on a large scale. Further improvements are to be made in the fine tuning of algorithms, enlargement of comprehensiveness of systems and the implementation of actual sample cases before the introduction into the marketplace.
The problem of analysing a bed bound patient (that is, a patient who is confined to their bed) is a relevant factor in whether or not they will receive timely medical care. This paper aims to investigate the challenge...
详细信息
https://***/10.1007/s11831-023-10030-1. In this article the optimization algorithm ‘Geometric Mean Optimizer’ was abbreviated as ‘GeMO’, but should instead have been abbreviated as ‘GMO’. The original article ha...
Machine learning relies heavily on time series forecasting, which has a wide range of uses, including although not limited to forecasting air quality, traffic patterns, and power use. Recent developments in deep train...
Machine learning relies heavily on time series forecasting, which has a wide range of uses, including although not limited to forecasting air quality, traffic patterns, and power use. Recent developments in deep training and matrix factorization models, however, have shown competitive performance and are emerging as alternatives. However, a fundamental disadvantage of these contemporary models over more established ones is their complexity. The Gradient Boosted Regression Tree, a well-known machine learning baseline, and popular deep learning models are compared in this work. We convert the time series forecast challenge into a window-based prediction issue, which is akin to (DNN) models. In addition, we design the GBRT model's input and output structure. In order to construct a single input instance to simulate a multi-output GBRT model, we concatenate the desired values with additional characteristics for each training window before flattening them. Using nine datasets, we undertake a thorough investigation and evaluate eight cutting-edge deep learning models recently presented at prestigious conferences. The findings show that a simple GBRT model performs much better than the state-of-the-art DNN models evaluated in this research thanks to the window-based input transformation.
Internet of Things (IoT) devices are the weak link in organizing a Wireless Sensor Network. Various Attacks on IoT devices can lead to different complex consequences. Real applications of the IoT generate a large amou...
详细信息
ISBN:
(数字)9798350374865
ISBN:
(纸本)9798350374872
Internet of Things (IoT) devices are the weak link in organizing a Wireless Sensor Network. Various Attacks on IoT devices can lead to different complex consequences. Real applications of the IoT generate a large amount of data every second, the confidentiality of which is of very high value. Therefore, detecting attacks in IoT interactions is of paramount interest from both science and industry. Among various attack detection approaches, machine learning methods show great potential due to their early detection ability. The paper presents a methodology for detecting attacks based on two machine learning methods: Random Forest (RF) and Artificial Neural Network (ANN). To conduct the experiment, various data sets were considered, the descriptions of which are given in the work. The experiment was carried out using open data sets obtained from real IoT devices. As a result, RF demonstrated a high accuracy of 98.6%.
Training general-purpose vision models on purely sequential visual data, eschewing linguistic inputs, has heralded a new frontier in visual understanding. These models are intended to not only comprehend but also seam...
详细信息
In this paper, the author describes the solution for the IEEE BigData Cup 2022 Challenge: Vehicle class and orientation detection in the real-world using synthetic images from driving simulators. This challenge’s tas...
详细信息
ISBN:
(纸本)9781665480468
In this paper, the author describes the solution for the IEEE BigData Cup 2022 Challenge: Vehicle class and orientation detection in the real-world using synthetic images from driving simulators. This challenge’s task is to enhance the performance of the vehicle detection models, which are trained solely on photo-realistic images, in real-world scenarios. By applying image-to-image translation and domain adaptation technique, the proposed solution can improve the detection results on real-world images using models trained on synthetic data. Furthermore, the proposed method ranked 2nd in the leaderboard with final score of 0.4456.
Due to its affordable and high-quality services, cloud computing has lately attracted a lot of interest. Due to the on- demand, pay-per-use characteristics that cloud services provide, which encourage companies to out...
Due to its affordable and high-quality services, cloud computing has lately attracted a lot of interest. Due to the on- demand, pay-per-use characteristics that cloud services provide, which encourage companies to outsource parts of their operations with better service delivery and more value, they have become an essential component of both businesses et people's everyday lives during the last ten years. In the next years, a continued migration towards cloud-based services is predicted by the current market trend, which started in 2019. Despite the many benefits that the cloud computing paradigm offers to both enterprises and consumers, security issues are expected to be the biggest cloud computing challenges in 2020. Security problems are a result of a number of variables, including the streaming nature of these solutions and the technology that support cloud computing, which includes hybridization and multitenancy. This research examines security concerns in service-driven cloud computing in order to shed light on the situation of the industry at the moment. This paper's main contribution is an analysis of cloud security over the last ten years and the presentation of a thorough taxonomy of security concerns throughout the three-layer architecture, which includes Infrastructure-as-a-Service (IaaS), Platform-as- (PaaS), and Software-as-a-Service (SaaS).
暂无评论