Today, forecasting the stock market has been one of the most challenging issues for the ‘‘artificial intelligence’’ AI research community. Stock market investment methods are sophisticated and rely on analyzing massive volumes of data. In recent years, machine-learning techniques have come under increasing scrutiny to assess and improve market pred...
 Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important is...
 Deep learning (DL), a branch of machine learning (ML), is the core technology in today’s technological advancements and innovations. Deep learning-based approaches are the state-of-the-art methods used to analyse and detect complex patterns in large datasets, such as credit card transactions. However, most credit card fraud models in the literatu...
 Vehicular edge computing (VEC) has emerged as a solution that places computing resources at the edge of the network to address resource management, service continuity, and scalability issues in dynamic vehicular environments. However, VEC faces challenges such as task offloading, varying communication conditions, and data security. To tackle thes...
 The COVID-19 pandemic has reshaped education and shifted learning from in-person to online. While this shift offers advantages such as liberating the learning process from time and space constraints and enabling education to occur anywhere and anytime, a challenge lies in detecting student engagement during online learning due to limited interactio...
 This research explores the potential of technologies in human activity recognition among the elderly population. More precisely, using sensor data and implementing Active Learning (AL), Machine Learning (ML), and Deep learning (DL) techniques for elderly activity recognition. Moreover, the study leverages the HAR70+ dataset, providing insight int...
 Diabetic retinopathy (DR) produces bleeding, exudation, and new blood vessel formation conditions. DR can damage the retinal blood vessels and cause vision loss or even blindness. If DR is detected early, ophthalmologists can use lasers to create tiny burns around the retinal tears to inhibit bleeding and prevent the formation of new blood vess...
 Background 1. The hon’ble prime minister launched the svamitva scheme on the national panchayati raj day, 24th april 2020 with a resolve to enable the economic progress of rural india by providing “record of rights” to every rural household owner. The scheme aims to demarcate inhabited (abadi) land in rural areas through the latest surveying dron...
 Cyberbullying is when someone is bullied using technology as an intermediary. Despite the fact that it has been a problem for many years, the impact on young people has just recently become more widely recognized. Bullies thrive on social media platforms, and teens and children who use them are vulnerable to attacks. A copious amount of usergener...
 The Department of Consumer Affairs monitors the daily prices of 22 essential food commodities through 550 price reporting centres across the country. The Department also maintains buffer stock of pulses, viz., gram, tur, urad, moon and masur, and onion for strategic market interventions to stabilize the volatility in prices. Decisions for market ...
 Background: Crop diseases can devastate yields, leading to significant financial losses for farmers. Early detection and timely intervention are crucial for effective management. Description: Develop an AI-driven system that analyzes crop images and environmental data to predict potential disease outbreaks. This system will provide farmers with a...
 Background: Use of encrypted messaging/social media apps like Telegram, WhatsApp and Instagram for drug trafficking are on the rise. Channels operating on Telegram and WhatsApp and Instagram handles are blatantly being misused by drug traffickers for offering various narcotic drugs and Psychotropic substances for sale. Description: WhatsApp and Tel...
 Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure. Description: The a...
 Background: In today’s digital age, a wide variety of services and processes take place online. Users of these digital facilities are required to upload government-issued containing documents or provide data for successfully availing the services. However, the uploaded documents or data which are required to facilitate these digital services and pr...
 Credit card fraud detection is a relevant problem that draws attention of machine learning. In the fraud detection task, there are some peculiarities present, such as the unavoidable condition of a strong class imbalance, the existence of unlabelled transaction, and the large number of records that must be processed. The present paper aims to pro...
 Day by day the cases of heart diseases are increasing at a rapid rate and it’s very Important and concerning to predict any such diseases beforehand. This diagnosis is a difficult task i.e. it should be performed precisely and efficiently. The research paper mainly focuses on which patient is more likely to have a heart disease based on various m...
 Accurately classifying brain tumor types is critical for timely diagnosis and potentially saving lives. Magnetic Resonance Imaging (MRI) is a widely used non-invasive method for obtaining high-contrast grayscale brain images, primarily for tumor diagnosis. The application of Convolutional Neural Networks (CNNs) in deep learning has revolutioniz...
 : In this paper, we are implementing a credit card fraud detection system, by using big data technologies. Credit card is one of the most divisive products among all the financial tools available. The usage of credit cards has become common in today’s world and huge volume of transaction happens online. The increase in these transactions has al...
 Frauds in credit card transactions are common today as most of us are using the credit card payment methods more frequently. This is due to the advancement of Technology and increase in online transaction resulting in frauds causing huge financial loss. Therefore, there is need for effective methods to reduce the loss. In addition, fraudsters f...
 Diagnosing a brain tumor takes a long time and relies heavily on the radiologist’s abilities and experience. The amount of data that must be handled has increased dramatically as the number of patients has increased, making old procedures both costly and ineffective. Many researchers investigated a variety of algorithms for detecting and classifyin...
 Health is very important for human life. In particular, the health of the brain, which is the executive of the vital resource, is very important. Diagnosis for human health is provided by magnetic resonance imaging (MRI) devices, which help health decision makers in critical organs such as brain health. Images from these devices are a source of...
 OCR is used to identify the character from human written text. To recognize the text segmentation of character is important stage. So here, we addressed different techniques to recognize the character. This document also presents comparison of different languages for character and numeral recognition with its accuracy achieved by different writer...
 Face recognition based smart attendance system using IoT is a tool for recognizing the students face while taking attendance by using face biometrics based on monitor camera image capturing. In our face recognition based smart attendance project, a raspberry pi system will be able to find and recognize human faces fast and precisely in images. ...
 Brain tumor detection is a critical application in the field of medical imaging, aimed at aiding healthcare professionals in the early and accurate diagnosis of brain tumors. This project leverages machine learning and deep learning techniques in Python to developa robust and reliable brain tumor detection system. The system undergoes sensitivi...
 Building a quantum analog of classical deep neural networks represents a fundamental challenge in quantum computing. A key issue is how to address the inherent non-linearity of classical deep learning, a problem in the quantum domain due to the fact that the composition of an arbitrary number of quantum gates, consisting of a series of sequenti...
 The deployment of automated deep-learning classifiers in clinical practice has the potential to streamline the diagnosis process and improve the diagnosis accuracy, but the acceptance of those classifiers relies on both their accuracy and interpretability. In general, accurate deep-learning classifiers provide little model interpretability, whi...
 Decades of research have shown machine learning superiority in discovering highly nonlinear patterns embedded in electroencephalography (EEG) records compared with conventional statistical techniques. However, even the most advanced machine learning techniques require relatively large, labeled EEG repositories. EEG data collection and lab...
 Cerebrovascular diseases such as stroke are among the most common causes of death and disability worldwide and are preventable and treatable. Early detection of strokes and their rapid intervention play an important role in reducing the burden of disease and improving clinical outcomes. In recent years, machine learning methods have attracte...
 Machine learning (ML) can make use of agricultural data related to crop yield under varying Crop based nutrient levels, and climatic fluctuations to suggest appropriate crops or supplementary nutrients to achieve the highest possible production. The aim of this study was to evaluate the efficacy of five distinct ML models for a dataset sourced ...
  Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these a...
 Nowadays, digital images are a main source of shared information in social media. Meanwhile, malicious software can forge such images for fake information. So, it’s crucial to identify these forgeries. This problem was tackled in the literature by various digital image forgery detection techniques. But most of these techniques are tied to detec...
 In this paper, modifications in neoteric architectures such as VGG16, VGG19, ResNet50, and InceptionV3 are proposed for the classification of COVID-19 using chest X-rays. The proposed architectures termed “COV-DLS” consist of two phases: heading model construction and classification. The heading model construction phase utilizes four modified d...
 Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods.Recently, the rise of machine learning and the rapid...
  In recent months, coronavirus disease 2019 (COVID-19) has infected millions of people worldwide. In addition to the clinical tests like reverse transcription- polymerase chain reaction (RT-PCR), medical imaging techniques such as computed tomography (CT) can be used as a rapid technique to detect and evaluate patients infected by COVID...
 The rise of machine learning has unlocked new ways of analysing structural neuroimaging data, including brain age prediction. In this state-of-the-art review, we provide an introduction to the methods and potential clinical applications of brain age prediction. Studies on brain age typically involve the creation of a regression machine learning mod...
 The usage of credit cards for online and regular purchases is exponentially increasing and so is the fraud related with it. A large number of fraud transactions are made every day. Various modern techniques like artificial neural network Different machine learning algorithms are compared, including Logistic Regression, Decision Trees, Random Forest...
 Machine learning and its subfield deep learning techniques provide opportunities for the development of operator mental state monitoring, especially for cognitive workload recognition using electroencephalogram (EEG) signals. Although a variety of machine learning methods have been proposed for recognizing cognitive workload via EEG recently, there...
 This paper presents a comparison of conventional and modern machine (deep) learning within the framework of anomaly detection in self-organizing networks. While deep learning has gained significant traction, especially in application scenarios where large volumes of data can be collected and processed, conventional methods may yet offer strong stat...
 The aim of our project is to design and fabricate a pneumatically operated tapping machine is called universal tapping machine. This device is operated by compressed air. It consists of the following main parts. 1. Barrel 2. Shaft 3. bearing 4. Couplings, etc. A high pressure compressed air is forced on a fan and the fan is made...
  The aim of our project is to design and fabricate a pneumatically operated tapping machine is called universal tapping machine. This device is operated by compressed air. It consists of the following main parts. 1. Barrel 2. Shaft 3. bearing 4. Couplings, etc. A high pressure compressed air is forced on a fan and the f...
 The wheel chair cum stretcher model is a mechanism which is used for moving bed up and down. This is used for handicapped person for living like the normal persons do. For making the handicapped person’s job easy (i.e., they can move bed up and down). Two way switches is used to control the flow wheel chair. The Battery used to drive the D.C motor....
 large-scale distributed training of deep neural networks results in models with worse generalization performance as a result of the increase in the effective mini-batch size. previous approaches attempt to address this problem by varying the learning rate and batch size over epochs and layers, or ad hoc modifications of batch normalization we propo...
 Knee osteoarthritis (KOA) as a disabling joint disease has doubled in prevalence since the mid-20th century. Early diagnosis for the longitudinal KOA grades has been increasingly important for effective monitoring and intervention. Although recent studies have achieved promising performance for baseline KOA grading, longitudinal KOA grading has bee...
 Background matting is a recently developed image matting approach, with applications to image and video editing. It refers to estimating both the alpha matte and foreground from a pair of images with and without foreground objects. Recent work has applied deep learning to background matting, with very promising performance achieved. However, existi...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 The most vital information about the electrical activities of the brain can be obtained with the help of Electroencephalography (EEG) signals. It is quite a powerful tool to analyze the neural activities of the brain and various neurological disorders like epilepsy, schizophrenia, sleep related disorders, parkinson disease etc. can be investigated ...
 The most vital information about the electrical activities of the brain can be obtained with the help of Electroencephalography (EEG) signals. It is quite a powerful tool to analyze the neural activities of the brain and various neurological disorders like epilepsy, schizophrenia, sleep related disorders, parkinson disease etc. can be investigated ...
 We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
 Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
 Traditional approaches to automatic classification of pollen grains consisted of classifiers working with feature extractors designed by experts, which modeled pollen grains aspects of special importance for biologists. Recently, a Deep Learning (DL) algorithm called Convolutional Neural Network (CNN) has shown a great improvement in performance in...
 With the rapid development of vehicular networks, vehicle-to-everything (V2X) communications have huge number of tasks to be calculated, which brings challenges to the scarce network resources. Cloud servers can alleviate the terrible situation regarding the lack of computing abilities of vehicular user equipment (VUE), but the limited resources, t...
 By redefining the conventional notions of layers, we present an alternative view on finitely wide, fully trainable deep neural networks as stacked linear models in feature spaces, leading to a kernel machine interpretation. Based on this construction, we then propose a provably optimal modular learning framework for classification that does not req...
 The detection and prevention of a network intrusion is a major concern. Machine Learning and Deep Learning methods detect network intrusions by predicting the risk with the help of training the data. Various machine learning and deep learning methods have been proposed over the years which are shown to be more accurate when compared to other networ...
 For the noise removal problem of noisy seismic data, an improved noise reduction technique based on feedforward denoising neural network (DnCNN) is proposed. The previous DnCNN, which was designed to minimise noise in seismic data, had an issue with a large network depth, which hampered training efficiency. The revised DnCNN technique was previousl...
 Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor of histidine kinase, through the response regulator, to the DNA alongside transcription features and initiates the transcription of correct response genes. Thus, the prediction of phosphoaspa...
 Breast Cancer comprises multiple subtypes implicated in prognosis. Existing stratification methods rely on the expression quantification of small gene sets. Next Generation Sequencing promises large amounts of omic data in the next years. In this scenario, we explore the potential of machine learning and, particularly, deep learning for breast canc...
 Monitoringthe depth of unconsciousnessduring anesthesia is beneficial in both clinical settings and neuroscience investigations to understand brain mechanisms. Electroencephalogram(EEG) has been used as an objective means of characterizing brain altered arousal and/or cognition states induced by anesthetics in real-time. Different general anestheti...
 The interpretation of deep neural networks (DNNs) has become a key topic as more and more people apply them to solve various problems and making critical decisions. Concept-based explanations have recently become a popular approach for post-hoc interpretation of DNNs. However, identifying human-understandable visual concepts that affect model decis...
 Cerebellar ataxia (CA) is concerned with the incoordination of movement caused by cerebellar dysfunction. Movements of the eyes, speech, trunk, and limbs are affected. Conventional machine learning approaches utilizing centralised databases have been used to objectively diagnose and quantify the severity of CA . Although these approaches achieved ...
 In mental health assessment, it is validated that nonverbal cues like facial expressions can be indicative of depressive disorders. Recently, the multimodal fusion of facial appearance and dynamics based on convolutional neural networks has demonstrated encouraging performance in depression analysis. However, correlation and complementarity between...
 Deep learning is recognized to be capable of discovering deep features for representation learning and pattern recognition without requiring elegant feature engineering techniques by taking advantage of human ingenuity and prior knowledge. Thus it has triggered enormous research activities in machine learning and pattern recognition. One of the mos...
 The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learningbased key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medi...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 In this article, we evaluate the performance ofcombining several model compression techniques. The techni-ques assessed were dark knowledge distillation, pruning, andquantization. We use the classification of chest x-rays as ascenario of experimentation. From this scenario, we found thatthe combination of these three techniques yielded a new modelc...
 Bitcoin and its decentralized computing paradigm for digital currency trading are one of the most disruptive technology in the 21st century. This paper presents a novel approach to developing a Bitcoin transaction forecast model, DLForecast, by leveraging deep neural networks for learning Bitcoin transaction network representations. DLForecast make...
 A number of electric devices in buildings can be considered as important demand response (DR) resources, for instance, the battery energy storage system (BESS) and the heat, ventilation, and air conditioning (HVAC) systems. The conventional model-based DR methods rely on efficient ondemand computing resources. However, the current buildings suffer ...
 A number of electric devices in buildings can be considered as important demand response (DR) resources, for instance, the battery energy storage system (BESS) and the heat, ventilation, and air conditioning (HVAC) systems. The conventional model-based DR methods rely on efficient ondemand computing resources. However, the current buildings suffer ...
 Drowsiness in driving causes the major road accidents. Now a day’s drowsiness due to drunken driving is increasing. If driver is found to be drowsiness in eyes more than 5 secs, then the eye blink sensor senses the blink rate. If the eyes are found to be closed, then the speed of the car slows down. In our proposed system, along with drowsiness, al...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 COVID-19 is a life threatening disease which has a enormous global impact. As the cause of the disease is a novel coronavirus whose gene information is unknown, drugs and vaccines are yet to be found. For the present situation, disease spread analysis and prediction with the help of mathematical and data driven model will be of great help to initia...
 A HYBRID CLOUD AND EDGE CONTROL STRATEGY FOR DEMAND RESPONSES USING DEEP REINFORCEMENT LEARNING AND TRANSFER LEARNING...
 We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
 The interpretation of deep neural networks (DNNs) has become a key topic as more and more people apply them to solve various problems and making critical decisions. Concept-based explanations have recently become a popular approach for post-hoc interpretation of DNNs. However, identifying human-understandable visual concepts that affect model decis...
 The detection and prevention of a network intrusion is a major concern. Machine Learning and Deep Learning methods detect network intrusions by predicting the risk with the help of training the data. Various machine learning and deep learning methods have been proposed over the years which are shown to be more accurate when compared to other networ...
 large-scale distributed training of deep neural networks results in models with worse generalization performance as a result of the increase in the effective mini-batch size. previous approaches attempt to address this problem by varying the learning rate and batch size over epochs and layers, or ad hoc modifications of batch normalization we propo...
 Automatic Leukemia or blood cancer detection is a challenging job and is very much required in healthcare centers. It has a significant role in early diagnosis and treatment planning. Leukemia is a hematological disorder that starts from the bone marrow and affects white blood cells (WBCs). Microscopic analysis of WBCs is a preferred approach for a...
 Automatic Leukemia or blood cancer detection is a challenging job and is very much required in healthcare centers. It has a significant role in early diagnosis and treatment planning. Leukemia is a hematological disorder that starts from the bone marrow and affects white blood cells (WBCs). Microscopic analysis of WBCs is a preferred approach for a...
 The ability to predict, anticipate and reason about future outcomes is a key component of intelligent decision-making systems. In light of the success of deep learning in computer vision, deep-learning-based video prediction emerged as a promising research direction. Defined as a self-supervised learning task, video prediction represents a suitable...
 The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
 The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
 The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
 A novel reconfigurable intelligent surfaces (RISs)- based transmission framework is proposed for downlink nonorthogonal multiple access (NOMA) networks. We propose a quality-of-service (QoS)-based clustering scheme to improve the resource efficiency and formulate a sum rate maximization problem by jointly optimizing the phase shift of the RIS and t...
 In this article, we evaluate the performance ofcombining several model compression techniques. The techni-ques assessed were dark knowledge distillation, pruning, andquantization. We use the classification of chest x-rays as ascenario of experimentation. From this scenario, we found thatthe combination of these three techniques yielded a new modelc...
 In this article, we evaluate the performance ofcombining several model compression techniques. The techni-ques assessed were dark knowledge distillation, pruning, andquantization. We use the classification of chest x-rays as ascenario of experimentation. From this scenario, we found thatthe combination of these three techniques yielded a new modelc...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 Monitoringthe depth of unconsciousnessduring anesthesia is beneficial in both clinical settings and neuroscience investigations to understand brain mechanisms. Electroencephalogram(EEG) has been used as an objective means of characterizing brain altered arousal and/or cognition states induced by anesthetics in real-time. Different general anestheti...
 Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor of histidine kinase, through the response regulator, to the DNA alongside transcription features and initiates the transcription of correct response genes. Thus, the prediction of phosphoaspa...
 By redefining the conventional notions of layers, we present an alternative view on finitely wide, fully trainable deep neural networks as stacked linear models in feature spaces, leading to a kernel machine interpretation. Based on this construction, we then propose a provably optimal modular learning framework for classification that does not req...
 Traditional approaches to automatic classification of pollen grains consisted of classifiers working with feature extractors designed by experts, which modeled pollen grains aspects of special importance for biologists. Recently, a Deep Learning (DL) algorithm called Convolutional Neural Network (CNN) has shown a great improvement in performance in...
 Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
 The most vital information about the electrical activities of the brain can be obtained with the help of Electroencephalography (EEG) signals. It is quite a powerful tool to analyze the neural activities of the brain and various neurological disorders like epilepsy, schizophrenia, sleep related disorders, parkinson disease etc. can be investigated ...
 Background matting is a recently developed image matting approach, with applications to image and video editing. It refers to estimating both the alpha matte and foreground from a pair of images with and without foreground objects. Recent work has applied deep learning to background matting, with very promising performance achieved. However, existi...
 The ability to predict, anticipate and reason about future outcomes is a key component of intelligent decision-making systems. In light of the success of deep learning in computer vision, deep-learning-based video prediction emerged as a promising research direction. Defined as a self-supervised learning task, video prediction represents a suitable...
 Building Energy Management System (BEMS) has been a substantial topic nowadays due to its importance in reducing energy wastage. However, the performance of one of BEMS applications which is energy consumption prediction has been stagnant due to problems such as low prediction accuracy. Thus, this research aims to address the problems by developing...
 Drowsiness of drivers is one of the significant cause of road accidents. Every year, there is an increase in the amount of deaths and fatal injuries globally. By detecting the driver’s drowsiness, road accidents can be reduced. This paper describes a machine learning approach for drowsiness detection. Face detection is employed to locate the region...
 Deep learning (DL) has proved successful in medical imaging and, in the wake of the recent COVID-19 pandemic, some works have started to investigate DL-based solutions for the assisted diagnosis of lung diseases. While existing works focus on CT scans, this paper studies the application of DL techniques for the analysis of lung ultra sonography (LU...
 Since stroke disease often causes death or serious disability, active primary prevention and early detection of prognostic symptoms are very important. Stroke diseases can be divided into ischemic stroke and hemorrhagic stroke, and they should be minimized by emergency treatment such as thrombolytic or coagulant administration by type. First, it is...
 In today's technical era, every startup or a company attempt to establish a better sort of communication between their Plants and the users, and for that purpose, they require a type of mechanism which can promote their plant effectively, and here the recommender system serves this motive. It is basically a filtering system that tries to predict an...
 Knee osteoarthritis (KOA) is a leading cause of disability among elderly adults, and it causes pain and discomfort and limits the functional independence of such adults. The aim of this study was the development of an automated classification model for KOA, based on the Kellgren–Lawrence (KL) grading system, using radiographic imaging and gait anal...
 Manual inspection of textiles is a long, tedious, and costly method. Technology has solved this problem by developing automatic systems for textile inspection. However, Jacquard fabrics present a challenge because patterns can be complex and seemingly random to systems. Only a few in-depth studies have been conducted on jacquard fabrics despite the...
 Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...
 The technology based modern agriculture industries are today’s requirement in every part of agriculture in Bangladesh. In this technology, the disease of plants is precisely controlled. Due to the variable atmospheric circumstances these conditions sometimes the farmer doesn’t know what type of disease on the plant and which type of medicine provid...
 There is a need for automatic systems that can reliably detect, track and classify fish and other marine species in underwater videos without human intervention. Conventional computer vision techniques do not perform well in underwater conditions where the background is complex and the shape and textural features of fish are subtle. Data-driven cla...
 Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these appro...
 In practical CCTV applications, there are problems of the camera with low resolution, camera fields of view, and lighting environments. These could degrade the image quality and it is difficult to extract useful information for further processing. Super-resolution techniques have been proposed widely by the researchers. However, many approaches are...
 A scalable approximate multiplier, called truncation- and rounding-based scalable approximate multiplier (TOSAM) is presented, which reduces the number of partial products by truncating each of the input operands based on their leading one-bit position. In the proposed design, multiplication is performed by shift, add, and small fixed-width multipl...
 In recent times the concept of smart cities have gained grate popularity. The ever increasing population has led to chaotic city traffic. As a result of the process of searching a parking lot becomes tedious. It is time consuming task leading to discomfort. The fuel consumption is on an increasing side due to such scenarios. The increase in vehicul...
  This paper aims to develop a tool for predicting accurate and timely traffic flow Information. Traffic Environment involves everything that can affect the traffic flowing on the road, whether it’s traffic signals, accidents, rallies, even repairing of roads that can cause a jam. If we have prior information which is very near approximate about a...
 Modern cars are incorporating an increasing number of driver assist features, among which automatic lane keeping. The latter allows the car to properly position itself within the road lanes, which is also crucial for any subsequent lane departure or trajectory planning decision in fully autonomous cars. Traditional lane detection methods rely on a ...
  In recent times, with the increase of Artificial Neural Network (ANN), deep learning has brought a dramatic twist in the field of machine learning by making it more artificially intelligent. Deep learning is remarkably used in vast ranges of fields because of its diverse range of applications such as surveillance, health, medicine, sports, robo...
 As object recognition technology has developed recently, various technologies have been applied to autonomous vehicles, robots, and industrial facilities. However, the benefits of these technologies are not reaching the visually impaired, who need it the most. In this paper, we proposed an object detection system for the blind using deep learning t...
 One common interest in radiography is producing radiographs with as low as possible radiation exposures to patients. In clinical practices, radiation exposure factors are preset for optimal image qualities to avoid underexposures which will lead to repeating examinations hence increasing radiation exposures to patients. Underexposed radiographs mai...
 Hospital patients can have catheters and lines inserted during the course of their admission and serious complications can arise if they are positioned incorrectly. Early recognition of malpositioned tubes is the key to preventing risky complications (even death), even more so now that millions of COVID-19 patients are in the need of these tubes an...
 This project gives the idea about Detection of various disease on grape field. Also provide the information about how to control this disease. India exported so many tons of grape every year. So, Grape played vital role in economic condition of country. But, because of disease the Grape quality is decrease so that we cannot exported this grape in f...
 This paper proposes a communication strategy for decentralized learning in wireless systems that employs adaptive modulation and coding capability. The main objective of this work is to address a critical issue in decentralized learning based on the cooperative stochastic gradient descent (C-SGD) over wireless systems: the relationship between the ...
 This study exploits a quantum neural network (QNN) for resource allocation in wireless communications. A QNN is presented to reduce time complexity while still maintaining performance. Moreover, a reinforcement-learning-inspired QNN (RL-QNN) is presented to improve the performance. Quantum circuit design of the QNN is presented to ensure the practi...
 Wireless Sensors Networks (WSN) is the self-configured wireless network which consists of a huge measure of resource-restrained Sensor Nodes (SN). In WSN, the key parameters are effectual energy utilization and security. The adversary could send false information because of the Malicious Nodes' (MNs') presence. Thus, to shun security threats, it is...
 The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...
 Deep neural network (DNN) has become increasingly popular in industrial IoT scenarios. Due to high demands on computational capability, it is hard for DNN-based applications to directly run on intelligent end devices with limited resources. Computation offloading technology offers a feasible solution by offloading some computation-intensive tasks t...
 The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
 Deep Neural Networks (DNNs) have become an essential and important supporting technology for smart Internet-of-Things (IoT) systems. Due to the high computational costs of large-scale DNNs, it might be infeasible to directly deploy them in energy-constrained IoT devices. Through offloading computation-intensive tasks to the cloud or edges, the comp...
 Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., s...
 This article surveys the interdisciplinary research of neuroscience, network science, and dynamic systems, with emphasis on the emergence of brain-inspired intelligence. To replicate brain intelligence, a practical way is to reconstruct cortical networks with dynamic activities that nourish the brain functions, instead of using only artificial comp...
 Many deep-learning methods have been developed for fault diagnosis. However, due to the difficulty of collecting and labeling machine fault data, the datasets in some practical applications are relatively much smaller than the other big data benchmarks. In addition, the fault data come from different machines. Therefore, on some occasions, fault di...
 The cross-lingual sentiment analysis (CLSA) aims to leverage label-rich resources in the source language to improve the models of a resource-scarce domain in the target language, where monolingual approaches based on machine learning usually suffer from the unavailability of sentiment knowledge. Recently, the transfer learning paradigm that can tra...
 By training different models and averaging their predictions, the performance of the machine-learning algorithm can be improved. The performance optimization of multiple models is supposed to generalize further data well. This requires the knowledge transfer of generalization information between models. In this article, a multiple kernel mutual lea...
 Predicting attention-modulated brain responses is a major area of investigation in brain-computer interface (BCI) research that aims to translate neural activities into useful control and communication commands. Such studies involve collecting electroencephalographic (EEG) data from subjects to train classifiers for decoding users' mental states. H...
 Image annotation aims to jointly predict multiple tags for an image. Although significant progress has been achieved, existing approaches usually overlook aligning specific labels and their corresponding regions due to the weak supervised information (i.e., ``bag of labels'' for regions), thus failing to explicitly exploit the discrimination from d...
 Due to the development of convenient brain-machine interfaces (BMIs), the automatic selection of a minimum channel (electrode) set has attracted increasing interest because the decrease in the number of channels increases the efficiency of BMIs. This study proposes a deep-learning-based technique to automatically search for the minimum number of ch...
  The popularity of mobile devices has led to an explosive growth in the number of mobile apps in which Android mobile apps are the mainstream. Android mobile apps usually undergo frequent update due to new requirements proposed by users. Just-In-Time (JIT) defect prediction is appropriate for this scenario for quality assurance because it can pr...
 Andriod malware poses a serious threat to users privacy, money, equipment and file integrity. A series of data-driven malware detection methods were proposed. However, there exist two key challenges for these methods: (1) how to learn effective feature representation from raw data; (2) how to reduce the dependence on the prior knowledge or human la...
 As 5G and mobile computing are growing rapidly, deep learning services in the Social Computing and Social Internet of Things (IoT) have enriched our lives over the past few years. Mobile devices and IoT devices with computing capabilities can join social computing anytime and anywhere. Federated learning allows for the full use of decentralized tra...
 The deployment of Deep Neural Networks (DNNs) on end-nodes at the extreme edge of the Internet-of-Things is a critical enabler to support pervasive Deep Learning-enhanced applications. Low-Cost MCU-based end-nodes have limited on-chip memory and often replace caches with scratchpads, to reduce area overheads and increase energy efficiency – requiri...
 Most convolutional neural network (CNN)-based cloud detection methods are built upon the supervised learning framework that requires a large number of pixel-level labels. However, it is expensive and time-consuming to manually annotate pixelwise labels for massive remote sensing images. To reduce the labeling cost, we propose an unsupervised domain...
 Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to ext...
 Point clouds are the most general data representations of real and abstract objects, and have a wide variety of applications in many science and engineering fields. Point clouds also provide the most scalable multi-resolution composition for geometric structures. Although point cloud learning has shown remarkable results in shape estimation and sem...
 In this paper, we present a real-world case study on deploying a face recognition application, using MTCNN detector and FaceNet recognizer. We report the challenges faced to decide on the best deployment strategy. We propose three inference architectures for the deployment, including cloud-based, edge-based, and hybrid. Furthermore, we evaluate the...
 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
 With increasing of data size and development of multi-core computers, asynchronous parallel stochastic optimization algorithms such as KroMagnon have gained significant attention. In this paper, we propose a new Sparse approximation and asynchronous parallel Stochastic Variance Reduced Gradient (SSVRG) method for sparse and high-dimensional machine...
 Deep learning (DL) based diagnosis models have to be trained by large quantities of monitoring data of machines. However, in real-case scenarios, machines operate under the normal condition in most of their life time while faults seldom happen. Therefore, though massive data are accessible, most are data of the normal condition while fault data are...
 Parkinson's disease (PD) is known as an irreversible neurodegenerative disease that mainly affects the patient's motor system. Early classification and regression of PD are essential to slow down this degenerative process from its onset. In this article, a novel adaptive unsupervised feature selection approach is proposed by exploiting manifold lea...
 Modern enterprises attach much attention to the selection of commercial locations. With the rapid development of urban data and machine learning, we can discover the patterns of human mobility with these data and technology to guide commercial district discovery. In this paper, we propose an unsupervised commercial district discovery framework via ...
  Accurate and fast event identification in power systems is critical for taking timely controls to avoid instability. In this paper, a synchrophasor measurementbased fast and robust event identification method is proposed considering different penetration levels of renewable energy. A difference Teager-Kaiser energy operator (dTKEO)-based algori...
 Deep learning methods have played a more and more important role in hyperspectral image classification. However, general deep learning methods mainly take advantage of the sample-wise information to formulate the training loss while ignoring the intrinsic data structure of each class. Due to the high spectral dimension and great redundancy between ...
 Social media is a popular medium for the dissemination of real-time news all over the world. Easy and quick information proliferation is one of the reasons for its popularity. An extensive number of users with different age groups, gender, and societal beliefs are engaged in social media websites. Despite these favorable aspects, a significant disa...
  Given a target binary function, the binary code search retrieves top-K similar functions in the repository, and similar functions represent that they are compiled from the same source codes. Searching binary code is particularly challenging due to large variations of compiler tool-chains and options and CPU architectures, as well as thousands o...
  Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to...
 Machine learning is widely used in developing computer-aided diagnosis (CAD) schemes of medical images. However, CAD usually computes large number of image features from the targeted regions, which creates a challenge of how to identify a small and optimal feature vector to build robust machine learning models. In this study, we investigate feasibi...
 In exercise gaming (exergaming), reward systems are typically based on rules/templates from joint movement patterns. These rules or templates need broad ranges in definitions of correct movement patterns to accommodate varying body shapes and sizes.This can lead to inaccurate rewards and, thus, inefficient exercise, which can be detrimental to prog...
 Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods. Recently, the rise of machine learning and the rapi...
 ? Wafer test is carried out after integrated circuits (IC) fabrication to screen out bad dies. ? In addition, the results can be used to identify problems in the fabrication process and improve manufacturing yield. ? However, the wafer test itself may induce defects to otherwise good dies. ? Test-induced defects not only hurt overall manufact...
 Representation learning has been proven to play an important role in the unprecedented success of machine learning models in numerous tasks, such as machine translation, face recognition and recommendation.The majority of existing representation learning approaches often require large amounts of consistent and noise-free labels. However, due to var...
 With the fast development of various positioning techniques such as Global Position System (GPS), mobile devices and remote sensing, spatio -temporal data has become increasingly available nowadays.Mining valuable knowledge from spatio - temporal data is critically important to many real-world applications including human mobility understanding, sm...
 The advancement of several significant technologies, such as artificial intelligence, cyber intelligence, and machine learning, has made big data penetrate not only into the industry and academic field but also our daily life along with a variety of cyber-enabled applications. In this article, we focus on a deep correlation mining method in heterog...
 Many predictive techniques have been widely applied in clinical decision Making such as predicting occurrence of a disease or diagnosis, evaluating Prognosis or outcome of diseases and assisting clinicians to recommend Treatment of diseases. However, the conventional predictive models or techniques are still not effective enough in capturing the...
 In this paper, heart disease prediction modeled using partially observable Markova decision process (POMDP) is proposed. In emergency, the patient is alerted through the doctor by fog computing. Ambulance sent to the location of patient at critical situations. The doctor gets the data through fog computing iFogSim. Fog computing in healthcare is a ...
 Ultrasound (US) imaging is used to provide the structural abnormalities like stones, infections and cysts for kidney diagnosis and also produces information about kidney functions. The goal of this work is to classify the kidney images using US according to relevant features selection. In this work, images of a kidney are classified as abnormal i...
 The problem about checking attendant is the main problem of teacher in nowadays. In order to solve this problem, Many systems have been completely changed due to this evolve to achieve more accurate results. However, in my study, these study still lack of the efficiency about correct the face and students cannot verify or pose to edit the data when...
 The recent scientific advances in understanding the hierarchical nature of the lithosphere and its dynamics based on systematic monitoring and evidence of its space-energy similarity at global, regional, and local scales did result the design of reproducible inter mediate term middle-range earthquake prediction technique. The real-time experimental...
 Deep learning (DL) has proved successful in medical imaging and, in the wake of the recent COVID-19 pandemic, some works have started to investigate DL-based solutions for the assisted diagnosis of lung diseases. While existing works focus on CT scans, this paper studies the application of DL techniques for the analysis of lung ultra sono graphy (L...
 Cancer is a major threat to the lives of human beings. Around 74% of the people who get affected by cancer lost their lives. But early detection of cancer cells can prevent death rates. CT(Computerized Tomography) is one of the major used for cancer cell identifications by the oncologist. Computer-aided cancer detection plays a major role in the de...
 Tumour is the undesired mass in the body. Brain tumour is the significant growth of brain cells. Manual method of classifying is time consuming and can be done at selective diagnostic centers only. Brain tumour classification is crucial task to do since treatment is based on different location and size of it. Magnetic Resonance Imaging (MRI) is mos...
 Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this...
 Distributed cloud computing environments rely on sophisticated communication and sharing paradigms for ease of access, information processing, and analysis. The challenging characteristic of such cloud computing environments is the concurrency and access as both the service provider and end-user rely on the common sharing platform. In this manuscri...
 Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing. Intrusion detection is one of the technologies for protecting the cloud computing environment from malicious attacks. However, network traffic in the cloud computing environment is charac...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp