Security analyses present a valuable chance for security engineers to substantiate the legitimacy of their work through utilization of diverse validation metrics. In this section, frequently used metrics will be employed over the suggested image…
Category: 7. Maths
-

Quantization-based chained privacy-preserving federated learning
Setup
This subsection evaluates the proposed Q-Chain FL scheme by comparing it with the FedAVG and Chain-PPFL algorithms. We implement all schemes in the Python programming language and the PyTorch framework. The evaluation is performed on three…
Continue Reading
-

Screen shooting resistant watermarking based on cross attention
Hameed, M. A., Abdel-Aleem, O. A. & Hassaballah, M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J. Ambient Intell. Hum. Comput. 14(5), 4639–4657.
Continue Reading
-

Transforming tabular data into images via enhanced spatial relationships for CNN processing
This study introduces the Novel Algorithm for Convolving Tabular Data (NCTD), a new technique for transforming tabular data into synthetic images, designed to enhance classification performance using CNNs. To evaluate its effectiveness, we…
Continue Reading
-

Lightweight hybrid transformers-based dyslexia detection using cross-modality data
In this study, we employ advanced techniques for each modality in order to guarantee the optimal feature extraction and classification. The proposed cross-modality-based DD is highlighted in Fig. 1. We employ a hybrid MRI feature extraction…
Continue Reading
-

Novel hybrid data-driven modeling based on feature space reconstruction and multihead self-attention gated recurrent unit: applied to PM2.5 concentrations prediction
Wu, Z. et al. Prediction of air pollutant concentrations based on the long short-term memory neural network. J. Hazard. Mater. 465, 133099. https://doi.org/10.1016/j.jhazmat.2023.133099 (2024).
…
Continue Reading
-

Learning temporal granularity with quadruplet networks for temporal knowledge graph completion
Problem formulation
A temporal knowledge graph \({\mathcal {G}}\) consists of quadruples represented as (s, r, o, t), where \(s, o \in {\mathcal {E}}\) denote subject (head) and object (tail) entities, respectively, and \(r \in {\mathcal {R}}\)…
Continue Reading
-

The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
AI-assisted sports activities in junior high school
From data analysis and motion pose estimation to virtual reality training, smart wearable devices, and intelligent referee systems, AI technology has brought revolutionary changes to various…
Continue Reading
-

Structural analysis of ferrocement composite panels with expanded perlite based mortar
Masood, A., Arif, M., Akhtar, S. & Haquie, M. Performance of ferrocement panels in different environments. Cem. Concr. Res. 33, 555–562 (2003).
Google Scholar
Mansur, M. A., Maalej,…
Continue Reading
-

The analysis of entrepreneurship evaluation system for talent cultivation in artistic creativity and animation under artificial intelligence
Datasets collection
This work uses the Netflix Animation Library (https://www.netflix.com/jp/browse/genre/3063) as the data source. The dataset is a high-quality collection of animated works widely used in animation research and development. It…
Continue Reading
