Traffic signs are basic security workplaces making the rounds,which expects a huge part in coordinating busy time gridlock direct,ensuring the pros-perity of the road and dealing with the smooth segment of vehicles and...
详细信息
Traffic signs are basic security workplaces making the rounds,which expects a huge part in coordinating busy time gridlock direct,ensuring the pros-perity of the road and dealing with the smooth segment of vehicles and indivi-duals by walking,*** a segment of the clever transportation structure,the acknowledgment of traffic signs is basic for the driving assistance system,traffic sign upkeep,self-administering driving,and various *** are different assessments turns out achieved for traffic sign acknowledgment in the ***,most of the works are only for explicit arrangements of traffic signs,for example,beyond what many would consider a possible ***fic sign recognizable proof is generally seen as trying on account of various complexities,for example,extended establishments of traffic sign *** critical issues exist during the time spent identification(ID)and affirmation of traffic *** signs are occasionally blocked not entirely by various vehicles and various articles are accessible in busy time gridlock scenes which make the signed acknowledgment hard and walkers,various vehicles,constructions,and loads up may frustrate the ID structure by plans like that of road *** concealing information from traffic scene pictures is affected by moving light achieved by environment conditions,time(day-night),and ***fic sign revelation and affirmation structure has two guideline sorts out:The essential stage incorpo-rates the traffic sign limitation and the resulting stage portrays the perceived traffic signs into a particular class.
The pandemic creates a more complicated providence of medical assistance and diagnosis procedures. In the world, Covid-19, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS Cov-2), and plague are widely known...
详细信息
The pandemic creates a more complicated providence of medical assistance and diagnosis procedures. In the world, Covid-19, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS Cov-2), and plague are widely known pandemic disease desperations. Due to the recent COVID-19 pandemic tragedies, various medical diagnosis models and intelligent computing solutions are proposed for medical applications. In this era of computer-based medical environment, conventional clinical solutions are surpassed by many Machine Learning and Deep Learning-based COVID-19 diagnosis models. Anyhow, many existing models are developing lab-based diagnosis environments. Notably, the Gated Recurrent Unit-based Respiratory Data Analysis (GRU-RE), Intelligent Unmanned Aerial Vehicle-based Covid Data Analysis (Thermal Images) (I-UVAC), and Convolutional Neural Network-based computer Tomography Image Analysis (CNN-CT) are enriched with lightweight image data analysis techniques for obtaining mass pandemic data at real-time conditions. However, the existing models directly deal with bulk images (thermal data and respiratory data) to diagnose the symptoms of COVID-19. Against these works, the proposed spectacle thermal image data analysis model creates an easy and effective way of disease diagnosis deployment strategies. Particularly, the mass detection of disease symptoms needs a more lightweight equipment setup. In this proposed model, each patient's thermal data is collected via the spectacles of medical staff, and the data are analyzed with the help of a complex set of capsule network functions. Comparatively, the conventional capsule network functions are enriched in this proposed model using adequate sampling and data reduction solutions. In this way, the proposed model works effectively for mass thermal data diagnosis applications. In the experimental platform, the proposed and existing models are analyzed in various dimensions (metrics). The comparative results obtained in the experiments just
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ...
详细信息
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua...
详细信息
Background: The automated classification of videos through artificial neural networks is addressed in this work. To explore the concepts and measure the results, the data set UCF101 is used, consisting of video clips ...
详细信息
The field of emotion recognition has garnered considerable interest due to its diverse applications in mental health, personalised advertising and enhancing user experiences. This research paper introduces a unique an...
详细信息
The field of emotion recognition has garnered considerable interest due to its diverse applications in mental health, personalised advertising and enhancing user experiences. This research paper introduces a unique and innovative method for emotion recognition by integrating heterogeneous convolutional neural networks (CNNs) with multimodal factorised bilinear pooling. Furthermore, the paper also incorporates the integration of mobile application recommendations as part of the overall approach. The proposed method leverages the power of CNNs to extract high-level features from different modalities, including facial expressions, speech signals and physiological signals. By using heterogeneous CNNs, each modality is processed independently to capture modality-specific emotional cues effectively. To fuse the extracted features, multimodal factorised bilinear pooling is employed, which captures the complex interactions between different modalities while reducing the computational complexity. This pooling technique efficiently combines the modality-specific features, resulting in a compact and discriminative representation of the emotional state. In addition to emotion recognition, this paper also introduces the integration of mobile app recommendations. By leveraging the recognised emotion, the system recommends relevant mobile applications that are tailored to the user’s emotional state. This integration enhances user experience and facilitates emotion regulation through the utilisation of appropriate mobile apps. Experimental evaluations are conducted on benchmark emotion recognition datasets, including the DEAP and MAHNOB_HCI datasets. The findings of the study highlight the effectiveness of the proposed methodology in terms of accuracy and robustness, surpassing existing approaches in the field. Additionally, the integration of the mobile app recommendation system showcases encouraging outcomes by offering personalised recommendations tailored to the user’s emotiona
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be...
详细信息
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have been developed to tackle these ***,most conventional Intrusion Detection System(IDS)models struggle with unseen cyberattacks and complex high-dimensional *** fact,this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system,named INTRUMER,which offers balanced accuracy,reliability,and security in cloud settings bymultiplemodulesworking together within *** traffic captured from cloud devices is first passed to the TC&TM module in which the Falcon Optimization Algorithm optimizes the feature selection process,and Naie Bayes algorithm performs the classification of *** selected features are classified further and are forwarded to the Heterogeneous Attention Transformer(HAT)*** this module,the contextual interactions of the network traffic are taken into account to classify them as normal or malicious *** classified results are further analyzed by the Explainable Prevention Module(XPM)to ensure trustworthiness by providing interpretable *** the explanations fromthe classifier,emergency alarms are transmitted to nearby IDSmodules,servers,and underlying cloud devices for the enhancement of preventive *** experiments on benchmark IDS datasets CICIDS 2017,Honeypots,and NSL-KDD were conducted to demonstrate the efficiency of the INTRUMER model in detecting network trafficwith high accuracy for different *** outperforms state-of-the-art approaches,obtaining better performance metrics:98.7%accuracy,97.5%precision,96.3%recall,and 97.8%*** results validate the robustness and effectiveness of INTRUMER in securing diverse cloud environments against sophisticated cyber threats.
Modern cyber security relies heavily on intrusion detection systems or IDS. However there are a number of issues with traditional IDS techniques such as high false positive rates, issues with scalability and trouble i...
详细信息
Audio fabrication is on the rise around the world, mainly occurring in two different ways, spoofing and Deepfakes. Spoofing involves manipulating audio by editing and rerecording to make it appear however it is intend...
详细信息
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti...
详细信息
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detection efficiency. Additionally, this technology provides developers with a means to quickly identify errors, thereby improving software robustness and overall quality. However, current research in software defect prediction often faces challenges, such as relying on a single data source or failing to adequately account for the characteristics of multiple coexisting data sources. This approach may overlook the differences and potential value of various data sources, affecting the accuracy and generalization performance of prediction results. To address this issue, this study proposes a multivariate heterogeneous hybrid deep learning algorithm for defect prediction (DP-MHHDL). Initially, Abstract Syntax Tree (AST), Code Dependency Network (CDN), and code static quality metrics are extracted from source code files and used as inputs to ensure data diversity. Subsequently, for the three types of heterogeneous data, the study employs a graph convolutional network optimization model based on adjacency and spatial topologies, a Convolutional Neural Network-Bidirectional Long Short-Term Memory (CNN-BiLSTM) hybrid neural network model, and a TabNet model to extract data features. These features are then concatenated and processed through a fully connected neural network for defect prediction. Finally, the proposed framework is evaluated using ten promise defect repository projects, and performance is assessed with three metrics: F1, Area under the curve (AUC), and Matthews correlation coefficient (MCC). The experimental results demonstrate that the proposed algorithm outperforms existing methods, offering a novel solution for software defect prediction.
暂无评论