Facial expression recognition is of crucial importance in a variety of applications, including human-computer interaction and health monitoring. However, when there is occlusion, especially when the mouth region is oc...
详细信息
ISBN:
(纸本)9798400713880
Facial expression recognition is of crucial importance in a variety of applications, including human-computer interaction and health monitoring. However, when there is occlusion, especially when the mouth region is occluded, conventional FER methods often suffer from significant performance degradation. To address this challenge, a novel FER model, Mini-Xception+CBAM, is proposed. This combines a lightweight network architecture with an attention mechanism to enhance performance in occlusion scenarios. The proposed approach utilises the Mini-Xception architecture and integrates a Convolutional Block Attention Module (CBAM) to enable the model to dynamically focus on key facial regions, such as the eyes and eyebrows, which are less likely to be occluded. Extensive experimentation on the FER2013, SMFER2013, and MFER2013 datasets demonstrates that the proposed model outperforms numerous state-of-the-art baseline models, including Mini-Xception, MobileNetV2, ResNet-18, and Vision Transformer, achieving The model achieved 90.4% accuracy on the FER2013, 89.2% on the SMFER2013, and 91.5% on the MFER2013, along with higher precision, recall, and F1 score. Furthermore, the model has been designed to be efficient, with a parameter count of 0.68M and a floating point operations count of 30.1M, making it ideal for deployment on devices with limited resources.
Point cloud processing has broad applications in autonomous driving and robotics. Serialization-based point cloud transformers map unordered point clouds onto directed curves, use sparse convolution for down-sampling ...
详细信息
In Federated Learning (FL) systems, clients share updates derived from their local data with the server while maintaining privacy. The server aggregates these updates to refine the global model. However, not all clien...
详细信息
Multi-view clustering (MVC) is essential for integrating heterogeneous data from multiple sources. However, many existing approaches are hindered by high computational complexity and the separate optimization of simil...
详细信息
This study employs the User-Centered Design (UCD) methodology to develop a mobile health (mHealth) application (app) specifically tailored for Bangladeshi women with Gestational Diabetes Mellitus (GDM). GDM affects ap...
详细信息
This study aimed to develop a proof-of-concept prototype of a machine learning system to forecast and mitigate the effect of floods in Kasese District. The researchers used a participatory design science approach. The...
详细信息
The Cognitive Data Model (CDM) is proposed. A novel approach to database design, inspired by the belief that the human brain operates with a logical data model independent of its anatomical structure. The study aims t...
详细信息
As socially assistive robots (SARs) enter more diverse care settings, including users’ homes, it is critical to identify the shifting privacy risks and dimensions of privacy this technology and its data collection ca...
详细信息
Blockchain technology has emerged as a key enabler for achieving the United Nations’ Sustainable Development Goals (SDGs) by offering transparent, decentralized solutions across multiple sectors. However, its inheren...
详细信息
Blockchain technology has emerged as a key enabler for achieving the United Nations’ Sustainable Development Goals (SDGs) by offering transparent, decentralized solutions across multiple sectors. However, its inherent transparency introduces significant privacy challenges, particularly in sensitive areas such as healthcare, energy, finance, and supply chains, where confidentiality is critical. To address this tension, this paper explores a range of emerging privacy-preserving techniques, including Ring Signatures, Zero-Knowledge Proofs (ZKPs), Secure Multi-Party Computation (SMPC), Trusted Execution Environments (TEEs), and mixers, analyzing their implementation, effectiveness, and limitations. Furthermore, we conduct a detailed technical study of next-generation blockchain platforms that integrate these techniques to balance privacy, scalability, and interoperability. Our contributions include a deep dive into privacy challenges in blockchain applications for SDGs, a comparative analysis of privacy-preserving solutions, a comprehensive evaluation of emerging platforms, and a review of existing research that leverages these privacy techniques in SDG-related domains. This work aims to provide critical insights into how blockchain technology can be effectively adapted to support sustainable development while safeguarding sensitive data.
For an integer s ≥ 1, let Cs(q0) be the generalized Zetterberg code of length q0s + 1 over the finite field Fq0 of odd characteristic. Recently, Shi et al. determined the covering radius of Cs(q0) for (Formula presen...
详细信息
暂无评论