-
2721
Speaker verification method based on deep information divergence maximization
Published 2021-07-01“…To solve the problem that the nonlinear relationship between speaker representations cannot be accurately captured in speaker verification, an objective function based on depth information divergence maximization was proposed.It could implicitly represent the nonlinear relationship between speaker representations by calculating the similarity between their distributions.Under the supervision of the optimization goal of maximizing the statistical correlation, the deep neural network was optimized towards the direction that the within-class data was more compact and the between-class data were far away from each other, and finally the discrimination of deep speaker representation space could be effectively improved.Experimental results show that compared with other deep learning methods, the relative EER of the proposed method is reduced by 15.80% at most, which significantly improves the system performance.…”
Get full text
Article -
2722
Dual-granularity lightweight model for vulnerability code slicing method assessment
Published 2021-11-01“…Aiming at the problems existing in the assessment of existing vulnerability code slicing method, such as incomplete extraction of slicing information, high model complexity and poor generalization ability, and no feedback in the evaluation process, a dual-granularity lightweight vulnerability code slicing evaluation (VCSE) model was proposed.Aiming at the code snippet, a lightweight fusion model of TF-IDF and N-gram was constructed, which bypassed the OOV problem efficiently, and the semantic and statistical features of code slices were extracted based on the double granularity of words and characters.A heterogeneous integrated classifier with high accuracy and generalization performance was designed for vulnerability prediction and analysis.The experimental results show that the evaluation effect of lightweight VCSE is obviously better than that of the current widely used deep learning model.…”
Get full text
Article -
2723
Intelligent adaptive edge systems:exploration and open issues
Published 2021-03-01“…Edge intelligence has emerged as a promising trend of the new generation of Internet of things.Edge computing devices are widely distributed, with various diverse end devices and services, delay sensitive, and serve mobile terminals.Therefore, the edge system needs to provide flexible, diverse, reconfigurable and scalable services.From the application fields of adaptive edge computing, the application requirements of intelligent adaptive edge systems were explored, the existing adaptive edge systems and their basic framework were analyzed and summarized, and the application of artificial intelligence technologies was discussed, such as deep learning and reinforcement learning.Then, how to design a special intelligent algorithm in specific application fields was introduced.Finally, the research status and future challenges in this field were discussed.…”
Get full text
Article -
2724
Survey of video behavior recognition
Published 2018-06-01“…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
Get full text
Article -
2725
Intelligent Planning Framework for Star-Walk Mission Based on Multimodal Observation Requirements Information
Published 2022-09-01“…Combined with the current requirement and research for rapid intelligent planning of star-walk observation mission, and a framework based on multimodal observation requirements such as voice and text was designed.The framework aimed to satisfied the requirements and focued on breaking through three key issues for future emergency rescue applications: multimodal requirement interpretation, full-elements resource coordination and complex emergency missions planning, and to open the automatic link between observation requirement, resource planning and mission planning by making full use of deep learning methods.On these bases, the framework had the ability to provided rapid remote sensing observation information with a specified time and made full play to the comprehensive eff ectiveness of remote sensing information resources.…”
Get full text
Article -
2726
Artificial Intelligence - Blessing or Curse in Dentistry? - A Systematic Review
Published 2024-12-01“…The search was conducted using the terms “Artificial Intelligence,” “Dentistry,” “Machine learning,” “Deep learning,” and “Diagnostic System.” Out of 607 publications analyzed from 2010 to 2024, only 13 were selected for inclusion based on their relevance and publication year. …”
Get full text
Article -
2727
SMART TRAFFIC SIGNAL CONTROL SYSTEM FOR TWO INTER-DEPENDENT INTERSECTIONS IN AKURE, NIGERIA
Published 2022-10-01“…The system developed in this work uses deep learning and computer vision techniques to estimate the density of traffic and uses this information to adaptively switch traffic signals based on the traffic density estimated. …”
Get full text
Article -
2728
Survey on adversarial attacks and defenses for object detection
Published 2023-11-01“…In response to recent developments in adversarial attacks and defenses for object detection, relevant terms and concepts associated with object detection and adversarial learning were first introduced.Subsequently, according to the evolution process of the methods, a comprehensive retrospective analysis was conducted on the research achievements in the realm of adversarial attacks and defense methods for object detection.Particularly, attack methods and defense strategies were categorized based on the attacker knowledge and the deep learning lifecycle.Furthermore, an in-depth analysis and discussion of the characteristics and relationships among different approaches were provided.Lastly, considering the strengths and limitations of existing research, the imminent challenges and directions were summarized for further exploration in adversarial attack and defense of object detection.…”
Get full text
Article -
2729
Neuroeducation meets virtual reality: theoretical analysis and implications for didactic design
Published 2024-06-01“…Taking into account the latest research in neuroscience, we want to explore the potential of using immersive virtual environments to facilitate deep learning in educational contexts that invoke the value of experience, imitation and repetition. …”
Get full text
Article -
2730
APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION
Published 2024-12-01“…This paper proposes an improved two-stage deep learning model using an Autoencoder network for phishing URL detection. …”
Get full text
Article -
2731
Brief communication: Training of AI-based nowcasting models for rainfall early warning should take into account user requirements
Published 2025-01-01“…<p>In the field of precipitation nowcasting, deep learning (DL) has emerged as an alternative to conventional tracking and extrapolation techniques. …”
Get full text
Article -
2732
Research on university email analysis based on SVM-RFE and Transformer-TBAM
Published 2024-11-01“…By mining and analyzing email text data from universities, it can help faculty members better understand students’opinions and suggestions, and improve management efficiency. At present, deep learning methods are the main approach for text sentiment analysis, but existing methods have not fully utilized the features in Chinese text. …”
Get full text
Article -
2733
WmFall: WiFi-based multistage fall detection with channel state information
Published 2018-10-01“…Considering that falling and sitting are very similar to each other, a special method is designed for distinguishing them with deep learning algorithm. Finally, the fall detection system is evaluated in a laboratory, which has 89% detection precision with false alarm rate of 8% on the average.…”
Get full text
Article -
2734
Research on Pneumothorax Classification Model of DenseNet Based on Multilayer Network Optimization
Published 2024-01-01“…Then, the binary cross-entropy loss function and accuracy evaluation function iteratively evaluated the effectiveness of the deep learning model and conducted multiple experiments. …”
Get full text
Article -
2735
Model Analysis of Environmental and Economic Impacts of a Microgrid Based on the Optimization Method
Published 2022-01-01“…Moreover, considering the environmental benefits of the microgrid two-level economic dispatch model, this paper constructs an intelligent analysis model and uses the deep learning algorithm as the system learning algorithm to improve the system data processing capability. …”
Get full text
Article -
2736
Prediction of reduced left ventricular ejection fraction using atrial fibrillation or flutter electrocardiograms: A machine-learning study
Published 2025-01-01“…This study aimed to investigate deep-learning approaches to predict reduced LVEF (<50%) in patients with AF/AFL ECGs and easily obtainable clinical information. …”
Get full text
Article -
2737
Probabilistic prediction of aero engine remaining useful life based on Bayesian graph attention transformer
Published 2025-02-01“…However, traditional deep learning methods often only analyze temporal data correlations, overlooking the complex non-Euclidian spatial relationship between multiple sensor data. …”
Get full text
Article -
2738
The role of Artificial Intelligence in detecting breast lesions using ultrasound
Published 2025-01-01“…Machine learning (ML) and deep learning (DL) drive advances, with DL's CNNs leading in image analysis. …”
Get full text
Article -
2739
First-in-Men Online Adaptive Robotic Stereotactic Body Radiation Therapy: Toward Ultrahypofractionation for High-Risk Prostate Cancer Patients
Published 2025-02-01“…Preclinical validation involved comparing deep learning–based auto-contouring with deformable or rigid contour propagation in terms of subsequent editing time. …”
Get full text
Article -
2740
Classification of Aortic Stenosis Patients via ECG-Independent Multi-Site Measurements of Cardiac-Induced Accelerations and Angular Velocities at the Skin Level
Published 2024-01-01“…Then, binary classification was performed through three machine learning and three deep learning methods, considering SCG, GCG, and their combination. …”
Get full text
Article