The data volume of the smart retreat service platform is large, and the slow dataprocessing rate will affect the service quality of the smart retreat service platform. Based on this, the big data fusion model is appl...
详细信息
Integrated energy systems represented by electric-thermal coupling systems have the characteristics of efficient energy utilization and environmental friendliness. They are a new force in energy reform and can effecti...
详细信息
Communication can be difficult for people who are deaf and dumb. These people might face difficulties in understanding the spoken language in their everyday social lives. Traditional methods do not find an effective w...
详细信息
The role of consumer shopping demand in the operation forecast of e-commerce platforms is very important, but there is the problem of incomplete data estimation. The k-NN nearest neighbor algorithm cannot accurately p...
详细信息
In order to further optimize the processing of business data and increase the effectiveness and accuracy of business data analysis, this research investigated the design of an intelligent processing system for busines...
详细信息
Given development in telescope and image acquisition technology, efficient processing and timely discovery of events have become challenges for astronomers and data scientists around the globe. Among modern sky survey...
详细信息
ISBN:
(纸本)9783031744426;9783031744433
Given development in telescope and image acquisition technology, efficient processing and timely discovery of events have become challenges for astronomers and data scientists around the globe. Among modern sky survey projects, GOTO (Gravitational-wave Optical Transient Observer) is searching for transient events with new breed of optical survey telescopes, which allow a faster and deeper assessment. As compared to conventional machine learning techniques that have been sup-optimal to identify new sources from a large pool of candidates, this works presents the application of convolutional neural networks, with different data augmentation methods being explored to handle issues of overfitting and imbalance data.
This study focuses on designing and implementing a shared entertainment system for single player games in China. The single player gaming industry faces challenges due to equipment limitations and the reliance on game...
详细信息
Increase in popularity of various deep learning methodologies has led to a huge increase in demand for training data. These training data often contain video featuring people but these videos often cannot be used due ...
详细信息
ISBN:
(纸本)9781665476409
Increase in popularity of various deep learning methodologies has led to a huge increase in demand for training data. These training data often contain video featuring people but these videos often cannot be used due to privacy concerns as people are identifiable. We present an extension to the DeepDish object tracking system running on a Raspberry Pi. DeepDish performs object detection in the Raspberry Pi itself, avoiding the need to ship raw video data off the device. Our extension adds online face detection and blurring to preserve privacy. We implement and evaluate four different face detection algorithms, achieving 83% accuracy using YuNet, while increasing the latency by 75%. We then implement and evaluate three different object tracking algorithms to reduce the latency increase by running the simpler object tracking algorithm, reducing the number of calls to the expensive face detection algorithm. The result is a significant decrease in latency at the cost of a small decrease in accuracy. We also implemented and compared three different face obfuscation algorithms, one of which achieves differential privacy.
Clustering is a method of grouping data based on similarities, and is an unsupervised technique for discovering patterns in data. In this research paper, various clustering algorithms such as k-Means, DBSCAN, Spectral...
详细信息
The rapid growth of IoT edge devices has caused in an unprecedented explosion of data volume. Extremely often, the created data is gathered and disseminated via edge-based IoT structures. When hostile IoT devices make...
详细信息
暂无评论