The thyroid gland is a butterfly-shaped organ located lower front of the neck that plays a critical role in one's overall well-being. According to survey, thyroid dysfunction is observed in 8.53% of Filipino adult...
详细信息
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been know...
详细信息
ISBN:
(数字)9781665471039
ISBN:
(纸本)9781665471046
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been known as a generic cache decision policy. However, because LCE caches at all the intermediate nodes, the cache of intermediate nodes can be duplicated. Therefore, various cache decision policies that eliminate redundancy have been proposed. In this paper, we evaluate the effect of the cache decision policies on QoE of video and audio transmission in ICN/CCN. We assess application-level QoS using a computer simulation with a tree network and QoE by means of subjective experiment.
Selective thermal emitters can boost the efficiency of heat-to-electricity conversion in thermophotovoltaic systems only if their spectral selectivity is high. We demonstrate a non-Hermitian metasurface-based selectiv...
详细信息
Automatic target recognition (ATR) for 3D synthetic aperture sonar (SAS) imagery is an intrinsic challenge in highly cluttered ocean environments, especially for objects partially or completely buried in the sediment....
Automatic target recognition (ATR) for 3D synthetic aperture sonar (SAS) imagery is an intrinsic challenge in highly cluttered ocean environments, especially for objects partially or completely buried in the sediment. Conventional dynamic range compression (DRC) techniques such as log-compression, which is a type of tone mapping intended to appeal to the human visual system, can further obscure the sonar signatures of these already physically occluded objects and lead to suboptimal downstream ATR performance, particularly for convolutional neural networks (CNNs). In this paper, we present a novel machine learning-based approach for tone mapping sub-bottom SAS imagery as a pre-processing stage in the 3D SAS ATR pipeline. This learned tone mapping function can be jointly optimized with a CNN-based ATR algorithm. We train and validate our method on measured volumetric SAS data captured by the Sediment Volume Search Sonar (SVSS) system.
作者:
Rabiha, Suciana GhadatiWibowo, AntoniLukasHeryadi, YayaComputer Science Department
BINUS Graduate Program-Doctor of Computer Science. Information Systems Department BINUS Online Learning Bina Nusantara University Jakarta11480 Indonesia Computer Science Department
BINUS Graduate Program-Doctor of Computer Science Bina Nusantara University 11480 Indonesia
Faculty of Engineering Universitas Katolik Indonesia Atma Jaya Indonesia Computer Science Department
BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University 11480 Indonesia
One of the health problems that require special attention is diabetes, besides the growth of this disease infection is increasing in various circles ranging from children, adults, men, women and the elderly. So to det...
详细信息
An accurate predictive model of temperature and humidity plays a vital role in many industrial processes that utilize a closed space such as in agriculture and building management. With the exceptional performance of ...
详细信息
An accurate predictive model of temperature and humidity plays a vital role in many industrial processes that utilize a closed space such as in agriculture and building management. With the exceptional performance of deep learning on time-series data, developing a predictive temperature and humidity model with deep learning is propitious. In this study, we demonstrated that deep learning models with multivariate time-series data produce remarkable performance for temperature and relative humidity prediction in a closed space. In detail, all deep learning models that we developed in this study achieve almost perfect performance with an R value over 0.99.
Accurate weekly electricity load prediction is of utmost importance for electricity providers to ensure uninterrupted power supply to customers. This study applies an Artificial Neural Network (ANN) to achieve precise...
Accurate weekly electricity load prediction is of utmost importance for electricity providers to ensure uninterrupted power supply to customers. This study applies an Artificial Neural Network (ANN) to achieve precise weekly electricity load prediction. The dataset used for the ANN model consists of three months’ worth of data, including daily workload profiles, holiday work profiles, temperature, and humidity. For model training, 90% of the data is utilized with the Levenberg-Marquardt algorithm, while the remaining 10% is used for testing. The Mean Average Percentage Error (MAPE) is employed as the error metric. Based on the test results, the weekly load prediction error rate using ANN is determined to be 1.78% based on the MAPE value.
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of ...
详细信息
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of new technology to quickly perpetrate fraud against customer transaction patterns. We analyze credit card transaction networks and identify suspicious patterns, such as transactions connected to multiple accounts or unusual transaction patterns, transactions made at unusual times, and to monitor credit card transactions in real-time and quickly identify suspicious transactions. TigerGraph is used to analyze data, display results on a dashboard, and send notifications via email. One meth’\ Vc 1``13-od commonly used in anomaly detection is to compare data values against the standard deviation. In this research, we explain the use of TigerGraph as a platform for anomaly detection above the standard deviation, as well as the use of the Louvain algorithm in finding merchant communities used by fraudsters. The data used in this study comes from Sparkov simulation data obtained from Kaggle. Our results show that by using TigerGraph, we managed to achieve a very high accuracy rate of 99.77%, precision 82.84%, recall 72.38%, and f1-score 77,26% in predicting transaction fraud on Sparkov simulation data. This is much better than the results reported in a paper that uses the supervised machine learning method with the AdaBoost algorithm which achieves the highest accuracy of 77%.
Exams are an important component of any educational program, including online education. In any test, there is a possibility of cheating, so its detection and prevention is important. This study aims to conduct an in-...
详细信息
ISBN:
(纸本)9781665474498
Exams are an important component of any educational program, including online education. In any test, there is a possibility of cheating, so its detection and prevention is important. This study aims to conduct an in-depth study of the online exam monitoring model approach based on facial recognition used to detect cheating. Based on the inclusion and exclusion criteria designed, 13 selected studies were obtained. From these studies, we conducted further analysis regarding the Face Detection Method, Face Recognition Method, Initial Feature, Behavior Analysis and Evaluation Metrics used in each study so as to provide answers to research questions. the most frequently used Face detection method was Viola-Jones with a presentation of 20%, then CNN and MTCNN with a total presentation of 21%. The most widely used face recognition method in selected studies is CNN and metrics Accuracy is one of the most frequently used evaluations with a percentage of 33%. While the features that are usually used to detect cheating during online exams include facial motion and head pose which occupies the first position. The second is eye movement, then multiple faces gaze estimation and facial expression is in third place. Other features that also play a role in analyzing cheating behavior are mouth detection, facial vector, landmark location, gesture and posture.
暂无评论