The world witnessed big changes in 2019 when a new virus called coronavirus affected the lives of hundreds of millions of individuals and led to huge disruptions in healthcare systems. Early prediction of this virus w...
详细信息
Wireless Mesh Networks (WMNs) is an important component of wireless communications by enhancing the network coverage. The mesh network topology is interconnecting all nodes in the cluster. However, the existing approa...
详细信息
Human Action Recognition(HAR)and pose estimation from videos have gained significant attention among research communities due to its applica-tion in several areas namely intelligent surveillance,human robot interaction...
详细信息
Human Action Recognition(HAR)and pose estimation from videos have gained significant attention among research communities due to its applica-tion in several areas namely intelligent surveillance,human robot interaction,robot vision,*** considerable improvements have been made in recent days,design of an effective and accurate action recognition model is yet a difficult process owing to the existence of different obstacles such as variations in camera angle,occlusion,background,movement speed,and so *** the literature,it is observed that hard to deal with the temporal dimension in the action recognition *** neural network(CNN)models could be used widely to solve *** this motivation,this study designs a novel key point extraction with deep convolutional neural networks based pose estimation(KPE-DCNN)model for activity *** KPE-DCNN technique initially converts the input video into a sequence of frames followed by a three stage process namely key point extraction,hyperparameter tuning,and pose *** the keypoint extraction process an OpenPose model is designed to compute the accurate key-points in the human ***,an optimal DCNN model is developed to classify the human activities label based on the extracted key *** improving the training process of the DCNN technique,RMSProp optimizer is used to optimally adjust the hyperparameters such as learning rate,batch size,and epoch *** experimental results tested using benchmark dataset like UCF sports dataset showed that KPE-DCNN technique is able to achieve good results compared with benchmark algorithms like CNN,DBN,SVM,STAL,T-CNN and so on.
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is *** sensitivity of the system to parameters...
详细信息
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is *** sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one *** various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical ***,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems.
In today's world, Android has become the most significant and standard operating system for smartphones. The acceptance of the rapidly growing android system has outcome in a significant enhancement in the number ...
详细信息
Heart disease is the leading cause of death in developed countries, as it causes many deaths annually. Despite the availability of effective treatments, heart disease remains a significant challenge to public health, ...
详细信息
Locomotor intent classification has become a research hotspot due to its importance to the development of assistive robotics and wearable *** work have achieved impressive performance in classifying steady locomotion ...
详细信息
Locomotor intent classification has become a research hotspot due to its importance to the development of assistive robotics and wearable *** work have achieved impressive performance in classifying steady locomotion ***,it remains challenging for these methods to attain high accuracy when facing transitions between steady locomotion *** to the similarities between the information of the transitions and their adjacent steady ***,most of these methods rely solely on data and overlook the objective laws between physical activities,resulting in lower accuracy,particularly when encountering complex locomotion modes such as *** address the existing deficiencies,we propose the locomotion rule embedding long short-term memory(LSTM)network with Attention(LREAL)for human locomotor intent classification,with a particular focus on transitions,using data from fewer sensors(two inertial measurement units and four goniometers).The LREAL network consists of two levels:One responsible for distinguishing between steady states and transitions,and the other for the accurate identification of locomotor *** classifier in these levels is composed of multiple-LSTM layers and an attention *** introduce real-world motion rules and apply constraints to the network,a prior knowledge was added to the network via a rule-modulating *** method was tested on the ENABL3S dataset,which contains continuous locomotion date for seven steady and twelve transitions *** results showed that the LREAL network could recognize locomotor intents with an average accuracy of 99.03%and 96.52%for the steady and transitions states,*** is worth noting that the LREAL network accuracy for transition-state recognition improved by 0.18%compared to other state-of-the-art network,while using data from fewer sensors.
Human memory, while remarkable, struggles to retain and recall intricate details from various experiences. This abstract proposes a novel "Experience Memory Network" to address this limitation in the context...
详细信息
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from...
详细信息
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from attackers when millions of users circulate the same network for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing data security approach prioritizes protecting data at rest in cloud storage but gives less thought to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts. Methods: The third-party auditor is provided access to data during the transfer phase, which is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data more susceptible to unauthorized access. However, growing concerns regarding data privacy and security have made outsourcing sensitive information to faraway data centers difficult. As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management. Results: The proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64, and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is illustrated graphically via simulation results. This strategy reduces power consumption by 13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes. Conclusion: As a result, the recommended architecture enhance
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian *** dynamic nature of FANETs,wit...
详细信息
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian *** dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol *** the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high *** paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and *** research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant *** research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in *** compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance *** protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive *** comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in ***,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.
暂无评论