As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around...
详细信息
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around sharing and discussing current events. Within these communities, users are enabled to share their opinions about each event. Using Sentiment Analysis to understand the polarity of each message belonging to an event, as well as the entire event, can help to better understand the general and individual feelings of significant trends and the dynamics on online social networks. In this context, we propose a new ensemble architecture, EDSAEnsemble (Event Detection Sentiment Analysis Ensemble), that uses Event Detection and Sentiment Analysis to improve the detection of the polarity for current events from Social Media. For Event Detection, we use techniques based on information Diffusion taking into account both the time span and the topics. To detect the polarity of each event, we preprocess the text and employ several Machine and Deep Learning models to create an ensemble model. The preprocessing step includes several word representation models: raw frequency, TFIDF, Word2Vec, and Transformers. The proposed EDSA-Ensemble architecture improves the event sentiment classification over the individual Machine and Deep Learning models. Authors
In response to the unique challenges of Mixed Reality (MR) game development, we developed GAMR, an analytics tool specifically designed for MR games. GAMR aims to assist developers in identifying and resolving gamepla...
详细信息
Evolving new diseases demand the need for technology to identify the disease in an effective way. Medical imaging in the field of disease identification helps to identify the disease by scanning the human parts, there...
详细信息
We propose to perform an image-based framework for electrical energy meter *** aim is to extract the image region that depicts the digits and then recognize them to record the consumed *** the readings of serial numbe...
详细信息
We propose to perform an image-based framework for electrical energy meter *** aim is to extract the image region that depicts the digits and then recognize them to record the consumed *** the readings of serial numbers and energy meter units,an automatic billing system using the Internet of Things and a graphical user interface is deployable in a real-time ***,such region extraction and character recognition become challenging due to image variations caused by several factors such as partial occlusion due to dust on the meter display,orientation and scale variations caused by camera positioning,and non-uniform illumination caused by *** this end,our work evaluates and compares the stateof-the art deep learning algorithm You Only Look Once(YOLO)along with traditional handcrafted features for text extraction and *** image dataset contains 10,000 images of electrical energymeters and is further expanded by data augmentation such as in-plane rotation and scaling tomake the deep learning algorithms robust to these image *** training and evaluation,the image dataset is annotated to produce the ground truth of all the ***,YOLO achieves superior performance over the traditional handcrafted features with an average recognition rate of 98%for all the *** proves to be robust against the mentioned image variations compared with the traditional handcrafted *** proposed method can be highly instrumental in reducing the time and effort involved in the currentmeter reading,where workers visit door to door,take images ofmeters and manually extract readings from these images.
In Natural Language Processing, text prediction represents the process of predicting the word with the highest probability through a predictive language model from a series of text corpus. The N-gram model is familiar...
详细信息
Blockchain technology has been utilized to bypass regulations on IoT security. Blockchain technology provides numerous benefits that can improve the security of Internet of Things devices with limited resources, such ...
详细信息
In recent years,statistics have indicated that the number of patients with malignant brain tumors has increased ***,most surgeons still perform surgical training using the traditional autopsy and prosthesis model,whic...
详细信息
In recent years,statistics have indicated that the number of patients with malignant brain tumors has increased ***,most surgeons still perform surgical training using the traditional autopsy and prosthesis model,which encounters many problems,such as insufficient corpse resources,low efficiency,and high *** the advent of the 5G era,a wide range of Industrial Internet of Things(IIOT)applications have been *** Reality(VR)and Augmented Reality(AR)technologies that emerged with 5G are developing rapidly for intelligent medical *** address the challenges encountered during neurosurgery training,and combining with cloud computing,in this paper,a highly immersive AR-based brain tumor neurosurgery remote collaborative virtual surgery training system is developed,in which a VR simulator is *** system enables real-time remote surgery training interaction through 5G *** experts and 18 novices were invited to participate in the experiment to verify the ***,the two simulators were evaluated using face and construction validation *** results obtained by training the novices 50 times were further analyzed using the Learning Curve-Cumulative Sum(LC-CUSUM)evaluation method to validate the effectiveness of the two *** results of the face and content validation demonstrated that the AR simulator in the system was superior to the VR simulator in terms of vision and scene authenticity,and had a better effect on the improvement of surgical ***,the surgical training scheme proposed in this paper is effective,and the remote collaborative training effect of the system is ideal.
The rapid advancement of technology has undoubtedly brought comfort to humanity, but it also necessitates robust authentication measures to ensure security in the ever-expanding e-world. This research aims to address ...
详细信息
This work deals with an ISAR (Inverse Synthetic Aperture Radar) image enhancement algorithm using target's sparse image and image's l1 norm minimization. As calculation of l1 norm of two-dimensional (2D) image...
详细信息
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab...
详细信息
暂无评论