Emotion recognition in facial images is a topic that has attracted many interests. Research on emotion recognition in facial images continues to face challenges such as variations of human faces due to environments or...
Emotion recognition in facial images is a topic that has attracted many interests. Research on emotion recognition in facial images continues to face challenges such as variations of human faces due to environments or situations. Of all the techniques that have been used, the Deep Convolution Neural Network (DCNN) method reports a significant improvement compared to traditional machine learning methods. In recent years, self-attachment mechanisms have increased in popularity in DCNN, especially in Natural Language Processing. In this study, we propose to add attention networks to DCNN method to improve the performance of emotion recognition. By incorporating self-attention mechanisms into the model architecture, the network is able to recognize which facial features are most relevant for each emotion, increasing the accuracy and interpretation of the model. This study reports an accuracy of 69.55% which is 11.15% higher than using the traditional DCNN model.
Anomaly detection plays an essential role in hyperspectral remote sensing. Various widespread detectors, such as ReedXiaoli (RX), sparse representation, or deep learning-based methods, have been developed by using the...
详细信息
This purpose of this study is find empirically The effect of management accounting information systems and decision making on managerial performance. The research method used is quantitative research methods with prim...
详细信息
In this paper, we propose an innovative digital asset system based on the MIN (MIN-DAS), which integrates PPoV consortium blockchain technology along with NFT identifiers, achieving the rights confirmation, decentrali...
详细信息
ISBN:
(数字)9798331528973
ISBN:
(纸本)9798331528980
In this paper, we propose an innovative digital asset system based on the MIN (MIN-DAS), which integrates PPoV consortium blockchain technology along with NFT identifiers, achieving the rights confirmation, decentralization, and high security for digital asset trading. We first deployed the MIN-DAS within the high-security MIN network and designed a built-in MIN-VPN security tunnel, enabling end-to-end communication encryption, thereby significantly bolstering transaction security. Subsequently, we adopted the PPoV consortium blockchain as the core processing engine, greatly increasing the speed of transaction processing to accommodate large-scale transaction demands. Moreover, MIN-DAS supports stablecoin transactions, effectively mitigating risks stemming from cryptocurrency market fluctuations. MIN-DAS provides a secure and efficient solution for digital asset trading. Our experimental findings reveal that, compared to existing traditional digital asset platforms, MIN-DAS demonstrates significant superiority in both performance and security.
Universities can employ informationtechnology as one means of achieving their goals and objectives. Universities can get advantages from informationtechnology, such as effective resource management and information m...
Universities can employ informationtechnology as one means of achieving their goals and objectives. Universities can get advantages from informationtechnology, such as effective resource management and information management for decision-making. However, don't forget that the campus must consider what technology is appropriate to assist them achieve their goals, particularly in the current industrial era 4.0 where technology is available with many different choices. The campus requires an enterprise architecture in order to design, manage, and coordinate informationtechnology infrastructure, applications, and processes strategically and thoroughly. The adoption of enterprise information system architecture (EA) is also intended to improve the quality of services provided to internal and external stakeholders. In this case, Enterprise Architecture can help an organization to match its informationtechnology resources with business processes and strategies to achieve their goals. This research was conducted using TOGAF ADM, also known as the Open Group Architecture Framework Architecture Development Method. This method offers best practices for creating enterprise architecture and emphasizes several steps that include creating an architectural vision, information systems, business architecture modeling to help XYZ campus manage all their informationtechnology.
IoT is increasingly being used in different areas of society. IoT is used in society by collecting values acquired by sensor devices through networks and analysing the data. IoT software is needed to use the IoT, but ...
详细信息
ISBN:
(数字)9798331522728
ISBN:
(纸本)9798331522735
IoT is increasingly being used in different areas of society. IoT is used in society by collecting values acquired by sensor devices through networks and analysing the data. IoT software is needed to use the IoT, but efficient software development methods are desired because software for an increasingly complex society tends to become more complex. This research aims to improve the efficiency of IoT software and develop an intuitive method for developing IoT *** paper proposes a development methodology that combines a data-flow-based programming approach with a procedural programming language. When the focus is on data, data flow programming is intuitive and efficient. On the other hand, when the focus is on data processing, it is better to use a procedural programming language because data is processed sequentially[1].In the hybrid IoT programming environment proposed in this paper, the code of a procedural programming language is generated from the description by data flow programming, and the program is executed by a micro *** products of this research are available as open source software[2], [3].
Multimodal Emotion Recognition in Conversation (ERC) is a task of predicting the emotion of each utterance in a conversation by utilizing both verbal and non-verbal modalities. However, existing approaches often strug...
详细信息
作者:
Tian, YePan, JingwenYang, ShangshangZhang, XingyiHe, ShupingJin, YaochuAnhui University
Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center
Institute of Artificial Intelligence Hefei230088 China Anhui University
School of Computer Science and Technology Hefei230601 China Anhui University
Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University
Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University
Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s...
详细信息
Data security is a threat for delivering data through the internet, and it is concerned with protecting sensitive data from unauthorized access. The security threats increase with the increase of sensitive data, so se...
详细信息
A slot antenna array with low cross-polarization level based on a novel substrate integrated coaxial line (SICL) feeding structure is proposed in this paper. The longitudinal slots are etched on the top layer as the r...
详细信息
暂无评论