Finding appropriate information on the web is a tedious task and thus demands an intelligent mechanism to assist users for this purpose. Students are the victims of information overloading on the internet the most, as...
详细信息
Pretrained language models (PLMs) have shown remarkable performance on question answering (QA) tasks, but they usually require fine-tuning (FT) that depends on a substantial quantity of QA pairs. Therefore, improving ...
详细信息
This article covers the design, implementation, mathematical modelling, and control of a multivariable, underactuated, low-cost, three-degrees-of-freedom experimental helicopter system (namely a 3-DOF helicopter). The...
详细信息
Ensemble object detectors have demonstrated remarkable effectiveness in enhancing prediction accuracy and uncertainty quantification. However, their widespread adoption is hindered by significant computational and sto...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights,a new type of WENO schemes has been proposed to solve conservation laws[*** et al.,***.,70(2017),pp.551–575].The purpose of this paper is to introduce a new formulation of conservative finite difference RBFWENO schemes to solve conservation *** the usual method for reconstructing the flux functions,the flux function is generated directly with the conservative *** with Guo and Jung(2017),the main advantage of this framework is that arbitrary monotone fluxes can be employed,while in Guo and Jung(2017)only smooth flux splitting can be used to reconstruct flux *** 1D and 2D benchmark problems are prepared to demonstrate the good performance of the new scheme.
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other ...
详细信息
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other through hand *** of hand gestures has become an important challenge for the recognition of sign *** are many existing models that can produce a good accuracy,but if the model test with rotated or translated images,they may face some difficulties to make good performance *** resolve these challenges of hand gesture recognition,we proposed a Rotation,Translation and Scale-invariant sign word recognition system using a convolu-tional neural network(CNN).We have followed three steps in our work:rotated,translated and scaled(RTS)version dataset generation,gesture segmentation,and sign word ***,we have enlarged a benchmark dataset of 20 sign words by making different amounts of Rotation,Translation and Scale of the ori-ginal images to create the RTS version *** we have applied the gesture segmentation *** segmentation consists of three levels,i)Otsu Thresholding with YCbCr,ii)Morphological analysis:dilation through opening morphology and iii)Watershed ***,our designed CNN model has been trained to classify the hand gesture as well as the sign *** model has been evaluated using the twenty sign word dataset,five sign word dataset and the RTS version of these *** achieved 99.30%accuracy from the twenty sign word dataset evaluation,99.10%accuracy from the RTS version of the twenty sign word evolution,100%accuracy from thefive sign word dataset evaluation,and 98.00%accuracy from the RTS versionfive sign word dataset ***,the influence of our model exists in competitive results with state-of-the-art methods in sign word recognition.
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and ...
详细信息
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and there is a relative lack of research on mass gathering *** believe real-time detection and monitoring of mass gathering behaviors are essential formigrating potential security risks and ***,it is imperative to develop a method capable of accurately identifying and localizing mass gatherings before disasters occur,enabling prompt and effective *** address this problem,we propose an innovative Event-Driven Attention Network(EDAN),which achieves image-text matching in the scenario of mass gathering events with good results for the first *** image-text retrieval methods based on global alignment are difficult to capture the local details within complex scenes,limiting retrieval *** local alignment-based methods aremore effective at extracting detailed features,they frequently process raw textual features directly,which often contain ambiguities and redundant information that can diminish retrieval efficiency and degrade model *** overcome these challenges,EDAN introduces an Event-Driven AttentionModule that adaptively focuses attention on image regions or textual words relevant to the event *** calculating the semantic distance between event labels and textual content,this module effectively significantly reduces computational complexity and enhances retrieval *** validate the effectiveness of EDAN,we construct a dedicated multimodal dataset tailored for the analysis of mass gathering events,providing a reliable foundation for subsequent *** conduct comparative experiments with other methods on our dataset,the experimental results demonstrate the effectiveness of *** the image-to-text retrieval task,EDAN achieved the best performance on the R@5 metric,w
This paper presents a novel two-stage progressive search approach with unsupervised feature learning and Q-learning (TSLL) to enhance surrogate-assisted evolutionary optimization for medium-scale expensive problems. T...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the traditional steganography which only requires the security of an ind...
详细信息
暂无评论