The concept of a probabilistic worst-case execution time (pWCET) has gradually emerged from the work of many authors over the course of 2-3 decades. Intuitively, pWCET is a simplifying model abstraction that safely ov...
详细信息
In today's era smart devices are integral part of our life and every device becomes smart if it is equipped with sensors and having ability to connect with internet. Without any hindrance we can connect and intera...
详细信息
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance...
详细信息
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhances the prediction performance of classifiers when tested on unseen *** learning(DL)models have a lot of parameters,and they frequently ***,to avoid overfitting,data plays a major role to augment the latest improvements in ***,reliable data collection is a major limiting ***,this problem is undertaken by combining augmentation of data,transfer learning,dropout,and methods of normalization in *** this paper,we introduce the application of data augmentation in the field of image classification using Random Multi-model Deep Learning(RMDL)which uses the association approaches of multi-DL to yield random models for *** present a methodology for using Generative Adversarial Networks(GANs)to generate images for data *** experiments,we discover that samples generated by GANs when fed into RMDL improve both accuracy and model *** across both MNIST and CIAFAR-10 datasets show that,error rate with proposed approach has been decreased with different random models.
Emotion classification has wide applications in education, robotics, virtual reality, etc. However, identifying subtle differences between fine-grained emotion categories remains challenging. Current methods typically...
详细信息
As a neurological disability that affects muscles involved in articulation, dysarthria is a speech impairment that leads to reduced speech intelligibility. In severe cases, these individuals could also be handicapped ...
详细信息
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***...
详细信息
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***,ensuring the security and confidentiality of the data while processing in the centralized network is very *** secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud *** are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud *** this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in *** of patients are monitored using wireless sensor devices and are then transferred to the *** protocol helps in avoiding unnecessary communication of authenticated data over the cloud *** security process is a procedure with the best security in most of the authentication *** node is responsible in carrying data packets from the sender to the receiver in the cloud *** Kerberos protocol is used in trust node to ensure *** communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and *** computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.
Federated learning enables multiple clients to collaboratively train a global model without revealing their local data. However, conventional federated learning often overlooks the fact that data stored on different c...
详细信息
GPT is a large language model (LLM) derived from natural language processing that can generate a human-like text using machine learning. However, these models raise questions about authenticity and reliability of mate...
详细信息
Critical theory is an approach to research focused on acknowledging and dismantling power structures. In this piece, we illustrate the ways in which security and privacy research already takes a critical approach and ...
详细信息
Distinguishing the breeds of animals is one of the major examination areas in animal welfare. Recognition of animal breeds demands numerous determining elements which are necessary to be explored and following classif...
详细信息
暂无评论