In recent years,a gain in popularity and significance of science understanding has been observed due to the high paced progress in computer vision techniques and *** primary focus of computer vision based scene unders...
详细信息
In recent years,a gain in popularity and significance of science understanding has been observed due to the high paced progress in computer vision techniques and *** primary focus of computer vision based scene understanding is to label each and every pixel in an image as the category of the object it belongs *** it is required to combine segmentation and detection in a single *** many successful computer vision methods has been developed to aid scene understanding for a variety of real world *** understanding systems typically involves detection and segmentation of different natural and manmade things.A lot of research has been performed in recent years,mostly with a focus on things(a well-defined objects that has shape,orientations and size)with a less focus on stuff classes(amorphous regions that are unclear and lack a shape,size or other characteristics Stuff region describes many aspects of scene,like type,situation,environment of scene *** hence can be very helpful in scene *** methods for scene understanding still have to cover a challenging path to cope up with the challenges of computational time,accuracy and robustness for varying level of scene complexity.A robust scene understanding method has to effectively deal with imbalanced distribution of classes,overlapping objects,fuzzy object boundaries and poorly localized *** proposed method presents Panoptic Segmentation on Cityscapes ***-V2 is used as a backbone for feature extraction that is pre-trained on ***-V2 with state-of-art encoder-decoder architecture of DeepLabV3+with some customization and optimization is employed Atrous convolution along with Spatial Pyramid Pooling are also utilized in the proposed method to make it more accurate and *** promising and encouraging results have been achieved that indicates the potential of the proposed method for robust scene understanding in a fast and
This paper investigates the impact of feature encoding techniques on the explainability of XAI (Explainable Artificial Intelligence) algorithms. Using a malware classification dataset, we trained an XGBoost model and ...
详细信息
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,t...
详细信息
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,the limits of these networks’battery-based energy to the sensor are the most critical impediments to selecting cryptographic ***,finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental *** this research,the main objective is to obtain data security during transmission by proposing a robust and low-power encryption algorithm,in addition,to examining security algorithms such as ECC and MD5 based on previous *** this research,the Energy Saving and Securing Data algorithm(ESSD)algorithm is introduced,which provides the Message Digest 5(MD5)computation simplicity by modifying the Elliptic Curve Cryptography(ECC)under the primary condition of power *** three algorithms,ECC,MD5,and ESSD,are applied to Low Energy Adaptive Clustering Hierarchy(LEACH)and Threshold-sensitive Energy Efficient Sensor Network Protocol(TEEN)hierarchical routing algorithms which are considered the most widely used in *** results of security methods under the LEACH protocol show that all nodes are dead at 456,496,and 496,respectively,to ECC,MD5,and *** results of security methods under the TEEN protocol show that the test ends at 3743,4815,and 4889,respectively,to ECC,MD5,and *** on these results,the ESSD outperforms better in terms of increased security and less power *** addition,it is advantageous when applied to TEEN protocol.
False news spreads quickly due to the extensive distribution of incorrect or misleading information across digital channels, which is a global problem. This bias undermines the credibility of information, promotes the...
详细信息
Stress is a significant concern in the work-place, as it contributes to 80% of workplace injuries, and medical professionals are particularly susceptible, especially during emergencies such as the Covid-19 outbreak. N...
详细信息
Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global *** study addresses the pressing issue of brain tumor classification using Magnetic reson...
详细信息
Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global *** study addresses the pressing issue of brain tumor classification using Magnetic resonance imaging(MRI).It focuses on distinguishing between Low-Grade Gliomas(LGG)and High-Grade Gliomas(HGG).LGGs are benign and typically manageable with surgical resection,while HGGs are malignant and more *** research introduces an innovative custom convolutional neural network(CNN)model,*** stands out as a lightweight CNN model compared to its *** research utilized the BraTS 2020 dataset for its *** with the gradient-boosting algorithm,GliomaCNN has achieved an impressive accuracy of 99.1569%.The model’s interpretability is ensured through SHapley Additive exPlanations(SHAP)and Gradient-weighted Class Activation Mapping(Grad-CAM++).They provide insights into critical decision-making regions for classification *** challenges in identifying tumors in images without visible signs,the model demonstrates remarkable performance in this critical medical application,offering a promising tool for accurate brain tumor diagnosis which paves the way for enhanced early detection and treatment of brain tumors.
Blockchain is a developing and promising field in transaction and identity management. Recent efforts have been underway to address issues of data insecurity and inefficiency presented by centralized systems. Philippi...
详细信息
This paper proposes an innovative decision support system based on sentiment analysis, specifically designed for the transportation sector. The system employs an aspect-based sentiment analysis approach, which accurat...
详细信息
Edge Computing (EC) is a distributed network architecture offering computation and storage resources at the network edge, addressing cloud computing limitations by optimizing latency and enhancing data safety and priv...
详细信息
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha...
详细信息
暂无评论