Gait as a biometric has become a popular research topic in recent years as a result of its numerous applications in sectors such as surveillance, authentication, and so on. It is capable of achieving detection at a di...
详细信息
ISBN:
(数字)9781665482509
ISBN:
(纸本)9781665482509
Gait as a biometric has become a popular research topic in recent years as a result of its numerous applications in sectors such as surveillance, authentication, and so on. It is capable of achieving detection at a distance that few other technologies can equal. It is still a difficult problem to solve since real human gait is influenced by several variable elements such as alterations in clothing, speed, and carrying situation. Also, unknown covariate circumstances may impact the training and testing settings for a specific individual in gait recognition. image sequences are typically used by computer-aided gait recognition systems without taking into account variables such as clothes and the contents of carrier bags while on the move. In this work, we provide a technique for selecting gait energy image-based (GEI) features, that is both effective and robust. The covariate factors have less impact on the given gait representation. A simple ten-layered convolutional neural network (CNN) is designed which intakes GEI as input. Several typical variations and occlusions that impact and worsen gait recognition ability are less susceptible to the suggested method. For both clothing and mobility variations, we used the CASIA datasets to assess our observations. The experimental findings reveal that in numerous circumstances, the deep neural network model created in this study achieved better results when compared with other existing algorithms.
Thermal imaging has long been utilized across industries to maintain electrical equipment and detect faults in machines, ensuring their reliable operation. Infrared thermography, or thermal imaging, has emerged as a p...
详细信息
As the use of Healthcare Information Technology has continued to rise, the issue of safe transfer of medical information with especial emphasis on images has become a major concern. The findings of this study propose ...
详细信息
Pedestrian trajectory prediction plays a pivotal role in ensuring the safety and efficiency of various applications, including autonomous vehicles and traffic management systems. This paper proposes a novel method for...
详细信息
Waste management is a pressing global issue, and the need for efficient waste separation processes is becoming increasingly important. Incorporating Machine Learning techniques with waste separation has yielded promis...
详细信息
Cyberbullying has become a widespread concern in our society, and its detection has grown in significance. In recent years, machine learning algorithms have exhibited considerable potential in detecting cyberbullying....
详细信息
A star sensor takes the stars as the reference sources for attitude measurement to output the star vectors in the coordinate system of the star sensor, providing high-precision measurement data for the attitude contro...
详细信息
Violations of the roadway leads to a decrease in the level of driver safety and the condition of the car, reduces the speed of movement. Violations include cracks, pits, ruts, the size of which can change every day, d...
详细信息
The development of computer vision systems stimulates the development of various applications in the field of image recognition. Methods and algorithms for image recognition in document processingsystems play a cruci...
The development of computer vision systems stimulates the development of various applications in the field of image recognition. Methods and algorithms for image recognition in document processingsystems play a crucial role. There is a lot of research in this direction, and one of the most difficult problems is handwritten text recognition. This includes the tasks of signature identification, which the authors of the paper consider. The article considers the main stages of signature analysis to establish authorship. They are the preprocessing of the signature, representation in a form convenient for applying author identification. A dataset containing sample signatures of various people is used. The described tools became means to develop software for preprocessingimages of signatures, extracting characteristics and identifying the author of the signature.
It is known that information security and privacy revolve around three principal keys: confidentiality, integrity, and availability. Depending on the environment, application, context, or use case, one of these princi...
详细信息
ISBN:
(纸本)9781665427357
It is known that information security and privacy revolve around three principal keys: confidentiality, integrity, and availability. Depending on the environment, application, context, or use case, one of these principles may prevail over the others. For a medical application, for example, confidentiality is essential. Therefore, any imaging transferred electronically must be encrypted to prevent unauthorized persons from seeing its contents. This paper exhibits a new efficient ciphering algorithm for the security of transmitted images in public networks such as the Internet or archived in cloud computing based on a three-dimensional S-box. The suggested method encrypts and decrypts the image block by block. Each block is 8x8 pixels. The encrypted data are obtained by replacing the original data and the key by its value in S-box. Substitution boxes (S-box) are generated using a proposed algorithm that produces a 3D S-box using the random function and permutation. The security analyses show that the presented algorithm has an important security level. The runtime of the proposed algorithms is fast compared to others image encryption algorithms.
暂无评论