Leaf disease recognition using image processing and deep learning techniques is currently a vibrant research *** studies have focused on recognizing diseases from images of whole *** approach limits the resulting mod...
详细信息
Leaf disease recognition using image processing and deep learning techniques is currently a vibrant research *** studies have focused on recognizing diseases from images of whole *** approach limits the resulting models’ability to estimate leaf disease severity or identify multiple anomalies occurring on the same *** studies have demonstrated that classifying leaf diseases based on individual lesions greatly enhances disease recognition *** those studies,however,the lesions were laboriously cropped by *** study proposes a semi-automatic algorithm that facilitates the fast and efficient preparation of datasets of individual lesions and leaf image pixel maps to overcome this *** datasets were then used to train and test lesion classifier and semantic segmentation Convolutional Neural Network(CNN)models,*** report that GoogLeNet’s disease recognition accuracy improved by more than 15%when diseases were recognized from lesion images compared to when disease recognition was done using images of whole leaves.A CNN model which performs semantic segmentation of both the leaf and lesions in one pass is also proposed in this *** proposed KijaniNet model achieved state-of-the-art segmentation performance in terms of mean Intersection over Union(mIoU)score of 0.8448 and 0.6257 for the leaf and lesion pixel classes,*** terms of mean boundary F1 score,the KijaniNet model attained 0.8241 and 0.7855 for the two pixel classes,***,a fully automatic algorithm for leaf disease recognition from individual lesions is *** algorithm employs the semantic segmentation network cascaded to a GoogLeNet classifier for lesion-wise disease *** proposed fully automatic algorithm outperforms competing methods in terms of its superior segmentation and classification performance despite being trained on a small dataset.
Recent years have seen significant studies into applying machine learning techniques for stock price prediction. However, most existing work in this field focuses on examining historical stock price data for forecasti...
详细信息
Increasing demand for spectrum causes the emergence of technologies like Cognitive Radio (CR). The resources like bandwidth and energy are primarily shared by the primary and secondary users in the CR network. The uti...
详细信息
The design simulation and manufacturing of an x-band frequency uneven amplitude 90° hybrid coupler are described in this paper. This hybrid coupler is used to create a feeder network with eight output ports opera...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data *** this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in *** the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy ***,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF *** propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF *** framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy *** data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy *** propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query *** VB-cm tree uses the vector commitment to verify the query *** fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing *** conduct an extensive evaluation of the proposed *** experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
Next-generation technologies aim to achieve highly efficient communication systems in the evolving wireless communication landscape. Among these, intelligent reflective surfaces (IRS) are expected to play a pivotal ro...
详细信息
The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encrypt...
详细信息
Due to the vast development of medical image technologies the orientation, dimension, and format of the medical images are changing drastically. The volume of these data is also changing drastically in the current sce...
详细信息
This paper discusses the design and analysis of circular shaped reconfigurable multiple-input and multiple-output (MIMO) antenna having inverted ohm-shaped slots with enhanced performance in wireless applications. Thi...
详细信息
Every smart application was improved based on today's advancements. Considering this advancement, improving the smart facilities further in the agriculture sector is the most required role. This might help the far...
详细信息
暂无评论