Results 21 to 30 of about 95,777 (258)

Pengenalan Emosi Pembicara Menggunakan Convolutional Neural Networks

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
Recognition of the speaker's emotions is an important but challenging component of Human-Computer Interaction (HCI). The need for the recognition of the speaker's emotions is also increasing related to the need for digitizing the company's operational ...
Rendi Nurcahyo, Mohammad Iqbal
doaj   +1 more source

Adaptation of Applications to Compare Development Frameworks in Deep Learning for Decentralized Android Applications

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2023
Not all frameworks used in machine learning and deep learning integrate with Android, which requires some prerequisites. The primary objective of this paper is to present the results of the analysis and a comparison of deep learning development ...
Beatriz Sainz-de-Abajo   +2 more
doaj   +1 more source

A Two-Stage Framework for Automated Malignant Pulmonary Nodule Detection in CT Scans

open access: yesDiagnostics, 2020
This research is concerned with malignant pulmonary nodule detection (PND) in low-dose CT scans. Due to its crucial role in the early diagnosis of lung cancer, PND has considerable potential in improving the survival rate of patients.
Shimaa EL-Bana   +2 more
doaj   +1 more source

Smart Assistive System for Visually Impaired People Obstruction Avoidance Through Object Detection and Classification

open access: yesIEEE Access, 2022
Recent progress in innovation is making the life prosper, simpler and easier for common individual. The World Health Organization (WHO) statistics indicate that a large amount of people experience visual losses, because of which they encounter many ...
Usman Masud   +4 more
doaj   +1 more source

Deep Learning-Based Human Activity Real-Time Recognition for Pedestrian Navigation

open access: yesSensors, 2020
Several pedestrian navigation solutions have been proposed to date, and most of them are based on smartphones. Real-time recognition of pedestrian mode and smartphone posture is a key issue in navigation.
Junhua Ye   +4 more
doaj   +1 more source

Evaluating Convolutional Neural Networks for Cage-Free Floor Egg Detection

open access: yesSensors, 2020
The manual collection of eggs laid on the floor (or ‘floor eggs’) in cage-free (CF) laying hen housing is strenuous and time-consuming. Using robots for automatic floor egg collection offers a novel solution to reduce labor yet relies on ...
Guoming Li   +4 more
doaj   +1 more source

Implementation of (λ, µ)-Convolution Product by Means of Tensordot Operation from Libraries for Tensor Algebra

open access: yesСовременные информационные технологии и IT-образование, 2022
Multidimensional matrix algebra is a successful data model for problems from a variety of subject areas. Many authors have described hardware and software complexes that implement the algebra of multidimensional matrices in its entirety or parallel ...
Evgeniy I. Goncharov
doaj   +1 more source

A Comparison of Nine Machine Learning Mutagenicity Models and Their Application for Predicting Pyrrolizidine Alkaloids

open access: yesFrontiers in Pharmacology, 2021
Random forest, support vector machine, logistic regression, neural networks and k-nearest neighbor (lazar) algorithms, were applied to a new Salmonella mutagenicity dataset with 8,290 unique chemical structures utilizing MolPrint2D and Chemistry ...
Christoph Helma   +4 more
doaj   +1 more source

Characterizing Deep-Learning I/O Workloads in TensorFlow

open access: yes, 2018
The performance of Deep-Learning (DL) computing frameworks rely on the performance of data ingestion and checkpointing. In fact, during the training, a considerable high number of relatively small files are first loaded and pre-processed on CPUs and then
Chien, Steven W. D.   +6 more
core   +1 more source

secureTF [PDF]

open access: yesProceedings of the 21st International Middleware Conference, 2020
Data-driven intelligent applications in modern online services have become ubiquitous. These applications are usually hosted in the untrusted cloud computing infrastructure. This poses significant security risks since these applications rely on applying machine learning algorithms on large datasets which may contain private and sensitive information ...
Quoc, Do Le   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy