Search
Search Results
-
Evaluation and Measurement
In this section, we introduce some of the evaluation metrics and the evaluation setups for language identification. Unsurprisingly, these metrics and... -
The effect of amount, type and reoccurrence of interactions in electronic books on word learning and story comprehension by kindergartners
Numerous studies have examined the positive and negative effects of various types of interactions that occur while children view electronic book...
-
Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA
The rise of artificial intelligence (AI) and machine learning (ML) has prompted concerns regarding the intellectual property (IP) protection of... -
Introduction to Language Identification
Language identification (LI) is the task of predicting the language(s) in a text or speech input. The main difference between LI of text and speech... -
Design and Implementation of Land Area Calculation for Maps Using Mask Region Based Convolutional Neural Networks Deep Neural Network
AbstractMaps of the land are developed by the surveyor, map developer according to survey of land. In such maps land boundaries are shown using...
-
6DOF pose estimation of a 3D rigid object based on edge-enhanced point pair features
The point pair feature (PPF) is widely used for 6D pose estimation. In this paper, we propose an efficient 6D pose estimation method based on the PPF...
-
Specific Challenges of Variation and Text Types
One fascinating aspect of language identification which makes it difficult is the similarity between languages. Some languages seem to be extremely... -
Automatic Assessment of Motor Impairments in Autism Spectrum Disorders: A Systematic Review
Autism spectrum disorder (ASD) is mainly described as a disorder of communication and socialization. However, motor abnormalities are also common in...
-
A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain
In this research work, a secured watermarking method has been proposed using Chinese Remainder Theorem (CRT) in combination with Integer Wavelet... -
Unpacking smart education’s soft smartness variables: Leadership and human resources capacities as key participatory actors
The education system has been radically transformed by technological impetuses owed to the Fourth Industrial Revolution (4.0). Most recently,...
-
Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage
With the widespread cloud storage devices, most users store their data over cloud storage. A dishonest user might raise a false claim about the... -
Searching for Satoshi
In modern times the identity of few people has been the object of more significant inquiry and mystery than the inventor of Bitcoin, Satoshi... -
Exploring the active constituents of Oroxylum indicum in intervention of novel coronavirus (COVID-19) based on molecular docking method
The severe acute respiratory syndrome COVID-19 declared a global pandemic by WHO has become the present wellbeing worry to the whole world. There is...
-
Forecast Aggregation and Error Comparison: An Empirical Study
The aim of this paper is to present empirical results associated with forecast performance. It is known that common measures of error fail to be... -
Comparison of Encryption Techniques to Encrypt Private Parts of an Image
This article compares two methods for encrypting private information of the image and to make the image data highly secure. One method implements the... -
Motion Analysis
With image sequences, one can analyze change information or moving objects in the image (Bovik 2005; Davies 2005; Hartley and Zisserman 2004;... -
Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability
Elder abuse has been recognized as an important public health problem, and will become increasingly serious as the world's population ages.... -
Hyperparameter autotuning of programs with HybridTuner
Algorithms must often be tailored to a specific architecture and application in order to fully harness the capabilities of sophisticated computer...
-
Certificateless network coding proxy signatures from lattice
Network coding can improve the information transmission efficiency and reduces the network resource consumption, so it is a very good platform for...