Object segmentation and recognition is an imperative area of computer vision andmachine learning that identifies and separates individual objects within an image or video and determines classes or categories based on ...
详细信息
Object segmentation and recognition is an imperative area of computer vision andmachine learning that identifies and separates individual objects within an image or video and determines classes or categories based on their *** proposed system presents a distinctive approach to object segmentation and recognition using Artificial Neural Networks(ANNs).The system takes RGB images as input and uses a k-means clustering-based segmentation technique to fragment the intended parts of the images into different regions and label thembased on their ***,two distinct kinds of features are obtained from the segmented images to help identify the objects of *** Artificial Neural Network(ANN)is then used to recognize the objects based on their *** were carried out with three standard datasets,MSRC,MS COCO,and Caltech 101 which are extensively used in object recognition research,to measure the productivity of the suggested *** findings from the experiment support the suggested system’s validity,as it achieved class recognition accuracies of 89%,83%,and 90.30% on the MSRC,MS COCO,and Caltech 101 datasets,respectively.
With recent advancements made in wireless communication techniques,wireless sensors have become an essential component in both data collection as well as tracking *** Sensor Network(WSN)is an integral part of Internet...
详细信息
With recent advancements made in wireless communication techniques,wireless sensors have become an essential component in both data collection as well as tracking *** Sensor Network(WSN)is an integral part of Internet of Things(IoT)and it encounters different kinds of security *** is designed as a game changer for highly secure and effective digital ***,the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as *** proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and determine the optimal paths to reach the destination in clustered *** MCRP-BWSN technique,Chimp Optimization Algorithm(COA)-based clustering technique is designed to elect a proper set of Cluster Heads(CHs)and organize the selected *** addition,Horse Optimization Algorithm(HOA)-based routing technique is also presented to optimally select the routes based onfitness ***,HOA-based routing technique utilizes blockchain technology to avail the shared mem-ory among nodes in the *** nodes are treated as coins whereas the ownership handles the sensor nodes and Base Station(BS).In order to validate the enhanced performance of the proposed MCRP-BWSN technique,a wide range of simulations was conducted and the results were examined under different *** on the performance exhibited in simulation outcomes,the pro-posed MCRP-BWSN technique has been established as a promising candidate over other existing techniques.
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this R...
详细信息
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this RS research is limited and needs to be *** previous method did notfind any user reviews within a time,so it gets poor accuracy and doesn’tfilter the irre-levant comments effi*** Recursive Neural Network-based Trust Recom-mender System(RNN-TRS)is proposed to overcome this method’s *** it is efficient to analyse the trust comment and remove the irrelevant sentence ***first step is to collect the data based on the transactional reviews of social *** second step is pre-processing using Imbalanced Col-laborative Filtering(ICF)to remove the null values from the *** the features from the pre-processing step using the Maximum Support Grade Scale(MSGS)to extract the maximum number of scaling features in the dataset and grade the weights(length,count,etc.).In the Extracting features for Training and testing method before that in the feature weights evaluating the softmax acti-vation function for calculating the average weights of the ***,In the classification method,the Recursive Neural Network-based Trust Recommender System(RNN-TRS)for User reviews based on the Positive and negative scores is analysed by the *** simulation results improve the predicting accuracy and reduce time complexity better than previous methods.
Individuals with food allergies face limitations in social events and restaurant dining. Artificial intelligence solutions should be offered to this category. In this paper, a recommender system is proposed for the be...
详细信息
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are...
详细信息
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are multiple applications available in this area but the challenge is open due to complexity of crowd and depends on the *** this paper,we have proposed a new method for pedestrian’s behavior *** filter has been used to detect pedestrian’s usingmovement based ***,we have performed occlusion detection and removal using region shrinking method to isolate occluded *** verification is performed on each human silhouette and wavelet analysis and particle gradient motion are extracted for each *** Wolf Optimizer(GWO)has been utilized to optimize feature set and then behavior classification has been performed using the Extreme Gradient(XG)Boost *** has been evaluated using pedestrian’s data from avenue and UBI-Fight datasets,where both have different *** mean achieved accuracies are 91.3%and 85.14%over the Avenue and UBI-Fight datasets,*** results are more accurate as compared to other existing methods.
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement Engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software Engineering,and iTrust Electronic Health Care System.
Earphone-type wearable devices, also known as "hearables,"will have many functions in the future. Some of those functions will require authentication of the wearer for access to the user's privacy inform...
详细信息
Stroke is a leading cause of global population mortality and disability, imposing burdens on patients and caregivers, and significantly affecting the quality of life of patients. Therefore, in this study, we aimed to ...
详细信息
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective st...
详细信息
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective strategy for preventing,detecting,and mitigating intrusion incidents will increase productivity.A crucial element of secure network traffic is Intrusion Detection System(IDS).An IDS system may be host-based or network-based to monitor intrusive network *** unusual internet traffic has become a severe security risk for intelligent *** systems are negatively impacted by several attacks,which are slowing *** addition,networked communication anomalies and breaches must be detected using Machine Learning(ML).This paper uses the NSL-KDD data set to propose a novel IDS based on Artificial Neural Networks(ANNs).As a result,the ML model generalizes sufficiently to perform well on untried *** NSL-KDD dataset shall be utilized for both training and *** this paper,we present a custom ANN model architecture using the Keras open-source software *** specific arrangement of nodes and layers,along with the activation functions,enhances the model’s ability to capture intricate patterns in network *** performance of the ANN is carefully tested and evaluated,resulting in the identification of a maximum detection accuracy of 97.5%.We thoroughly compared our suggested model to industry-recognized benchmark methods,such as decision classifier combinations and ML classifiers like k-Nearest Neighbors(KNN),Deep Learning(DL),Support Vector Machine(SVM),Long Short-Term Memory(LSTM),Deep Neural Network(DNN),and *** is encouraging to see that our model consistently outperformed each of these tried-and-true techniques in all *** result underlines the effectiveness of the suggested methodology by demonstrating the ANN’s capacity to accurately assess the effectiveness of the developed strategy
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information ***,IoHT is susceptible to cybersecur...
详细信息
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information ***,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for *** this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)*** proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 *** proposed scheme is secure against various attacks in both formal and informal security *** formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing *** results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases *** proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
暂无评论