Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow...
详细信息
Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow uncontrollably, forming a tumor on the skin. To prevent skin cancer from spreading and potentially leading to serious complications, it's critical to identify and treat it as early as possible. An innovative two-fold deep learning based skin cancer detection model is presented in this research work. Five main stages make up the proposed model: Preprocessing, segmentation, feature extraction, feature selection, and skin cancer detection. Initially, the Min–max contrast stretching and median filtering used to pre-process the collected raw image. From the pre-processed image, the Region of Intertest (ROI) is identified via optimized mask Region-based Convolutional Neural Network (R-CNN). Then, from the identified ROI areas, the texture features like Illumination-invariant Binary Gabor Pattern (II-BGP), Local Binary Pattern (LBP), Gray-Level Co-occurrence Matrix (GLCM), Color feature such as Color Correlogram and Histogram Intersection, and Shape feature including Moments, Area, Perimeter, Eccentricity, Average bending energy are extracted. To choose the optimal features from the extracted ones, the Golden Eagle Mutated Leader Optimization (GEMLO) is used. The proposed Golden Eagle Mutated Leader Optimization (GEMLO) is the conceptual amalgamation of the standard Mutated Leader Algorithm (MLA) and Golden Eagle Optimizer are used to select best features (GEO). The skin cancer detection is accomplished via two-fold-deep-learning-classifiers, that includes the Fully Convolutional Neural Networks (FCNs) and Multi-Layer Perception (MLP). The final outcome is the combination of the outcomes acquired from Fully Convolutional Neural Networks (FCNs) and Multi-Layer Perception (MLP). The PYTHON platform is being used to implement the suggested model. Using the curre
Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural Networks (DNN) have proven to be very useful in terms of noise genera...
详细信息
Medical imaging, a cornerstone of disease diagnosis and treatment planning, faces the hurdles of subjective interpretation and reliance on specialized expertise. Deep learning algorithms show improvements in automatin...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
Suicide represents a poignant societal issue deeply entwined with mental well-being. While existing research primarily focuses on identifying suicide-related texts, there is a gap in the advanced detection of mental h...
详细信息
Emotions have a significant impact on how people make decisions. Due to its potential applications in various fields, emotion intensity detection has attracted a lot of attention recently. Several methods have been pr...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has expanded the potential targets that hackers might *** adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or *** identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious *** research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)*** proposed model can identify various types of cyberattacks,including conventional and distinctive *** networks,a specific kind of feedforward neural networks,possess an intrinsic memory *** Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended *** such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual *** are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection *** model utilises Recurrent Neural Networks,specifically exploiting LSTM *** proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques.
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted ser...
详细信息
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted serverless functions are difficult to tame. They are lightweight, short-lived applications sensitive to power capping activities. In addition, they exhibit great individual and temporal variability, presenting idiosyncratic performance/power scaling goals that are often at odds with one another. To date, very few proposals exist in terms of tailored power management for serverless platforms. In this work, we introduce power synchronization, a novel yet generic mechanism for managing serverless functions in a power-efficient way. Our insight with power synchronization is that uniform application power behavior enables consistent and uncompromised function operation on shared host machines. We also propose PowerSync, a synchronization-based power management framework that ensures optimal efficiency based on a clear understanding of functions. Our evaluation shows that PowerSync can improve the energy efficiency of functions by up to 16% without performance loss compared to conventional power management strategies.
The cellular automaton (CA), a discrete model, is gaining popularity in simulations and scientific exploration across various domains, including cryptography, error-correcting codes, VLSI design and test pattern gener...
详细信息
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive r...
详细信息
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive results in a variety of ***,while DL-enabled systems achieve excellent performance,they are far from *** has been demonstrated,in several domains,that DL systems can err when they encounter cases they had not hitherto ***,the opacity of the produced agents makes it difficult to explain their behavior and ensure that they adhere to various requirements posed by human *** the other end of the software development spectrum of methods,behavioral programming(BP) facilitates orderly system development using self-standing executable modules aligned with how humans intuitively describe desired system *** this paper,we elaborate on different approaches for combining DRL with BP and,more generally,machine learning(ML) with executable specifications(ES).We begin by defining a framework for studying the various approaches,which can also be used to study new emerging approaches not covered *** then briefly review state-of-the-art approaches to integrating ML with ES,continue with a focus on DRL,and then present the merits of integrating ML with *** conclude with guidelines on how this categorization can be used in decision making in system development,and outline future research challenges.
暂无评论