Affective social anthropomorphic intelligent system
- Md. Adyelullahil Mamun,
- Hasnat Md. Abdullah,
- Md. Golam Rabiul Alam,
- Muhammad Mehedi Hassan,
- Md. Zia Uddin
Human conversational styles are measured by the sense of humor, personality, and tone of voice. These characteristics have become essential for conversational intelligent virtual assistants. However, most of the state-of-the-art intelligent ...
Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured data
In 2006 X. Zhang and S, Wang suggested efficient steganographic embedding by Exploiting Modification Direction (EMD) where each important secrecy bit is converted to (2n + 1) -ary notational system which produces by n pixel values where 1 pixel is ...
Wilson’s disease classification using higher-order Gabor tensors and various classifiers on a small and imbalanced brain MRI dataset
Wilson’s Disease (WD) is a rare, autosomal recessive disorder caused by excessive accumulation of Copper (Cu) in various human organs such as the liver, brain, and eyes. Accurate WD diagnosis is challenging because of: (1) subtle intensity ...
A novel multi secret image sharing scheme for different dimension secrets
The existing state of the art schemes deals with the same dimension secret images but less work is available in the literature for different dimension secret images. In this paper, we have proposed an efficient multi secret image sharing scheme ...
Capsule neural network based approach for subject specific and cross-subjects seizure detection from EEG signals
The objective of this study is to propose an approach to detect Seizure and Non-Seizure phenomenon from the highly inconsistent and non-linear EEG signals. In the view of performing cross-subject classification over the inconsistency and non-...
Full-page handwriting recognition and automated essay scoring for in-the-wild essays
Scoring of handwritten essays in school education settings is a time-consuming task. Normalized assessment and prompt feedback enable a student to improve the articulation, comprehension and overall presentation of ideas. In this work, we present ...
Segmentation and classification of white blood cancer cells from bone marrow microscopic images using duplet-convolutional neural network design
Cancer is a disease linked to the untamed and rapid division of cells in the body. Cancer detection through conventional methods like complete blood count is a tedious and time-consuming task prone to human errors. The introduction of image ...
Orthogonal array design based multi-objective CBO and SOS algorithms for band reduction in hyperspectral image analysis
A hyperspectral image is taken by infrared imaging spectrometer consist of a continuous series of hundreds of bands. These bands collect spectral information across the electromagnetic spectrum. The presence of high spectral correlation among the ...
Text-based emotion recognition using contextual phrase embedding model
In this paper, the proposed approach categories the sentences in the dataset into the various topical documents using the TE-LSTM+SC model. As well as, the model generates semantic words related to topics that are fed into the word embedding like ...
Predictive framework for crime data analysis using a hybrid logistic regression — support vector machine based ensemble classifier powered by CART (LR-SVMCART)
Significant rise in illegal activity has directly impacted socioeconomic growth and quality of life. In this article, a predictive crime data analysis framework has been proposed that can resolve the problem of scalability issues and accuracy ...
Image encryption algorithm with 2D coupled discrete chaos
A two-dimensional coupled discrete chaotic system is constructed by combining a two-dimensional coupled map lattice with a dynamic discrete tent map. The system has good initial value sensitivity and can quickly generate multi-dimensional integer ...
A wavelet-based watermarking for secure medical image transmission in telemedicine application
One method for securing multimedia data, and images in particular, from malicious attacks is watermarking, which involves adding a signature to the images. Traditional watermarking techniques, however, have drawbacks when used on sensitive images ...
A blockchain-based electronic medical records management framework in smart healthcare infrastructure
Electronic medical records are considered the main component in the health organizations’ system. Recently, the reputation of medical information patients and their privacy is very imperative in the healthcare realm. Therefore, this information is ...
Deepfake detection based on remote photoplethysmography
Deepfake, which superimpose an image of one person’s face on another person’s image. However, the number of malicious Deepfake uses is largely dominant. Deepfake technology has also improved in recent years, making previously effective detection ...
Deterministic solution of algebraic equations in sentiment analysis
Text mining methods usually use statistical information to solve text and language-independent procedures. Text mining methods such as polarity detection based on stochastic patterns and rules need many samples to train. On the other hand, ...
Classification of acute lymphoblastic leukemia using improved ANFIS
Many advanced technologies have been developed in the medical field where leukaemia plays a vital role, which may cause serious issues when it is unidentified. In the convolution method, human error may occur, so to avoid it, many tools have been ...
A survey on the utilization of Superpixel image for clustering based image segmentation
Superpixel become increasingly popular in image segmentation field as it greatly helps image segmentation techniques to segment the region of interest accurately in noisy environment and also reduces the computation effort to a great extent. ...
Multi-memory video anomaly detection based on scene object distribution
With the popularity of surveillance equipment and the rise of intelligent surveillance, video anomaly detection has gradually become a research hotspot. Among them, for video processing, the three-channel video frame data can be directly used as ...
Classification of crop leaf diseases using image to image translation with deep-dream
Crop diseases are one of the primary triggers of yield devastation. As a result, early detection of crop diseases is critical to avert crop losses. In this study, a Deep-Dream (DD) based crop leaf disease detection (CLDD) architecture is proposed ...
Adaptive user interface based on accessibility context
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to establish a multimodal framework based on scalable adaptation rules. This paper presents an Adaptive ...
Performance enhancement of SVD based dual image watermarking in wavelet domain using PSO and JAYA optimization and their comparison under hybrid attacks
In this paper, a dual image watermarking technique is proposed to secure the data, which utilizes the property of lifting wavelet transformation (LWT), singular value decomposition (SVD), Swarm optimization (PSO), and JAYA optimization. Dual image ...
A new two-dimensional sine-coupled-logistic map and its application in image encryption
Chaotic map has some important features such as unpredictability, ergodicity, and complexity. When chaotic map is widely used for information transmission and secure communication, its chaotic performance decides the security of encryption ...
Reversible data hiding using optimization, interpolation and binary image encryption techniques
Data security is very essential since the communication takes place in the open network. In order to protect the data techniques such as image encryption and data hiding have become very popular. In this paper, a Reversible Data Hiding (RDH) based ...
Fake news detection in social media based on sentiment analysis using classifier techniques
Fake news on social media, has spread for personal or societal gain. Detecting fake news is a multi-step procedure that entails analysing the content of the news to assess its trustworthiness. The article has proposed a new solution for fake news ...
GenSpecVidOnt: a reference ontology for knowledge based video analytics with multimodal genre detection
Video analytics refers to the process of automatically analysing a video for spatial and temporal events. Effective video analytics require exploitation of genre-related information leading to knowledge-based video analysis. The proposed model ...
PSR-LSTM model for weak pulse signal detection
In this paper, a weak impulse signal detection method based on phase space reconstruction of chaotic time series and long-term and short-term memory neural network (LSTM) in the deep learning model is proposed. Reconstructing the phase space of ...
On exploring weakly supervised domain adaptation strategies for semantic segmentation using synthetic data
Pixel-wise image segmentation is key for many Computer Vision applications. The training of deep neural networks for this task has expensive pixel-level annotation requirements, thus, motivating a growing interest on synthetic data to provide ...