Autism spectrum disorders (ASD) are neurodevelopmental disorders that are marked by enduring difficulties with speech, nonverbal communication, and restricted or repetitive behaviors. Early detection and intervention ...
Autism spectrum disorders (ASD) are neurodevelopmental disorders that are marked by enduring difficulties with speech, nonverbal communication, and restricted or repetitive behaviors. Early detection and intervention can greatly improve outcomes for people with ASD. Recently, deep learning algorithms have been applied to aid in the early detection of ASD using facial images. In this work, modifications of the commonly used VGG16 and VGG19 models for image recognition tasks are proposed to improve the performance of detecting ASD from a child’s frontal face image. The proposed model is unique, as it alters the architecture of existing models, adds an attentional mechanism, and applys transfer learning. These changes are intended to decrease the chance of overfitting and enhance the model’s capacity to capture subtle face characteristics. The performance of the updated model is assessed through accuracy, which is 82.55% for VGG19 and 80% for VGG16 model, and contrasted the outcomes of the original model. Performance of the modified model is also compared with that of the original model. The obtained results show that the modified model outperforms in detecting ASD from facial images, suggesting that the proposed modification is non-invasive for early detection of ASD and has the potential to contribute to the development of efficient tools.
An information system is an important part in an organization to support business processes and to achieve its vision and mission. The information system nowadays has been one of the assets that ought to be protected ...
详细信息
A significant number of cloud storage environments are already implementing deduplication *** to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is *** storage capa...
详细信息
A significant number of cloud storage environments are already implementing deduplication *** to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is *** storage capacity increases,additional storage solutions are *** leveraging deduplication,you can fundamentally solve the cost ***,deduplication poses privacy concerns due to the structure *** this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve *** the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is *** addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing *** proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.
We reviewed the application of modern technology for rapid and accurate multi-person real-time pose detection in the hazardous field of electrical engineering. We focused on two leading pose detection technologies: YO...
详细信息
This paper discusses intelligent constellation generation based on autoencoder communication system. In previous studies, the amplitude was set to fluctuate between r=0.0 and 1.0. However, when checking the generated ...
详细信息
ISBN:
(纸本)9798350305142
This paper discusses intelligent constellation generation based on autoencoder communication system. In previous studies, the amplitude was set to fluctuate between r=0.0 and 1.0. However, when checking the generated constellation, distortion was confirmed instead of the conventional symbol arrangement. Therefore, in this paper, it compares the case where the amplitude is constant, the case where the average amplitude within a Minibatch is 1, and the case where the average amplitude is 1 for Interval time. The communication standard used in this research is IEEE 802.11a, assuming wireless Local Area Network (LAN) specifications. The IEEE 802.11a standard has an Fast Fourier Transform (FFT) length of 64, a subcarrier number of 52, and Quadrature Phase Shift Keying (QPSK) and 16 Quadrature Amplitude Modulation (QAM), modulation methods. A guard interval of 800 ns is added and the symbol length is 4000 ns. First, a simulation was performed under the condition that the amplitude was kept constant. QPSK with 4 symbols, constant amplitude model is rounded more than previous research result. 16QAM with 16 symbols is arranged regularly like lined up on a line. Second, the simulation was performed under the condition that the average amplitude within the minibatch was set to 1. QPSK with 4 symbols, appears to rotate clockwise. 16QAM with 16 symbols has a more uniform symbol placement than previous research result. Third, a simulation was performed under the condition that the average amplitude within Interval time was set to 1. QPSK with 4 symbols, is the closest to square among QPSK output results so far. The direction is slightly tilted, but if it can be rotated a little more, it may be possible to reproduce the same symbol arrangement as before. 16QAM with 16 symbols, the symbol arrangement is biased as a whole. However, it can be seen that are arranged in line on the line, perhaps due to regularity. As future work, in addition to the conditions set this time, it will exa
This paper proposed Scalability in Autoencoder-based Orthogonal Frequency Division Multiplexing(OFDM) communication system. In the previous research, only the comparison between IEEE802.11a and Autoencoder by the conv...
详细信息
Recently, image forgery has become an alarming trend with the growth of available easy-to-use editing and generation tools. Modern DeepFake methods have achieved extraordinary progress in realistic face manipulation, ...
Recently, image forgery has become an alarming trend with the growth of available easy-to-use editing and generation tools. Modern DeepFake methods have achieved extraordinary progress in realistic face manipulation, thus raising concerns among the public about the misuse of such technologies. Unfortunately, with the obnoxiously wide range of possible manipulation and artifact-covering methods, most existing state-of-the-art detection methods lack the generalization capability to handle the output variations. To address this issue, a noticeable shift towards using attention mechanisms has emerged using balanced portions of the latest challenging datasets to detect intra-and inter-spatial relations. Our paper provides a comprehensive analysis of modern deep learning-based methods, showing the benefits of the shift. In addition, we make propositions for future research directions and dataset-building methodology.
Learning to write in children requires the child's habit of using a pencil to write on paper. The manual method has drawbacks such as the use of a lot of paper when children have to study harder to keep repeating ...
详细信息
Recently, deep learning has emerged as a powerful tool for automating various tasks in manufacturing industry. Deep learning has shown promise particularly in classifying food products, e.g., identifying sweet oranges...
详细信息
暂无评论