With open connectivity and emergent computing, the Industrial Internet of Things (IIoT) combined with cloud computing resources provides significant breakthroughs in the field of industrial automation. These developme...
详细信息
Graph neural networks(GNN) are a special variant of neural networks which help in dealing with unstructured data such as graph data. The advent of the GNN has helped in dealing with problems in different domains, espe...
详细信息
Speech-recognition technology is an essential component of many smart IoT devices. To make these systems secure and privacy-preserving, it is important to consider outsourcing speech-recognition functionality to a thi...
详细信息
ISBN:
(数字)9798350374629
ISBN:
(纸本)9798350374636
Speech-recognition technology is an essential component of many smart IoT devices. To make these systems secure and privacy-preserving, it is important to consider outsourcing speech-recognition functionality to a third-party storage provider. By removing the speech-recognition process from the device itself, the amount of personal data stored on the device is minimized. Additionally, the provider can ensure the strictest security standards are met when the audio data is stored, including the use of encryption and access control mechanisms. Furthermore, the provider can also ensure that the speech-recognition process is done using the latest technologies to ensure accurate recognition of the audio data. To ensure the end-user’ s privacy is kept intact, the provider should allow only authorized users to access the audio data. Additionally, the provider should also enable data access logging and audit trails allowing for the tracking of any access to the data. By outsourcing speech-recognition services to a third-party, smart IoT devices can ensure the highest levels of privacy and security while still enabling users to get the most out of their device. The server processes the encrypted data to generate recognition results, such as user commands and voice printing, without compromising the privacy of the user’ s voice data. To enhance voice data privacy, federated learning can be employed in the design of these models. This approach enables distributed training of the model without the need to transmit the user’ s voice data to a central server. The adoption of this approach in the IoT industry is gaining momentum as it offers the potential to create smarter and more secure IoT devices that inspire customer trust.
Coincidence timing calibration is fundamental to PET imaging. The electronics, cable lengths, and detector physics such as charge drift and dept. dependence add to the measured time differences in coincidence sorting ...
详细信息
This study proposes a method of analysis method that can be monitored using bio-signals in mobile environments. The proposed model is designed in a parallel structure that utilizes PPG and PCG signals related to the h...
详细信息
Image processing is a field that focuses on analyzing and manipulating digital images to enhance quality, extract information, or achieve specific goals. In particular, face recognition is a technology focused on anal...
详细信息
ISBN:
(数字)9798350349740
ISBN:
(纸本)9798350349757
Image processing is a field that focuses on analyzing and manipulating digital images to enhance quality, extract information, or achieve specific goals. In particular, face recognition is a technology focused on analyzing facial features to identify and verify individuals. It involves extracting unique facial patterns and comparing them with a database of known faces. While face recognition technology is widely used in various applications, there is a need for specialized python's libraries and methodologies to accurately identify individuals who keep their faces covered due to religious or cultural reasons. There is a huge collection of libraries are available on face recognition modules, by using these libraries to recognize Islamic women while wearing Headscarf (Hijab) as they pass through security gates without the need to remove the Headscarf and not reveal their faces. This contributes to achieving security goals and preserving the rights of Muslim women.
The goal of gasification-based biomass power plants in this research is to be able to produce 5-10 KW of electricity through the thermal energy conversion process. Syngas, a byproduct of the burning of biomass, is cre...
详细信息
computer Vision is a concept which works with the methods for automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. To fulfill the new challenges, the syst...
详细信息
This study proposes a novel approach for identi-fying plant leaves using a combination of handcrafted visual leaf image features(shape, color, texture, and preliminary vein properties), their extraction strategies (ba...
详细信息
ISBN:
(数字)9798331517984
ISBN:
(纸本)9798331517991
This study proposes a novel approach for identi-fying plant leaves using a combination of handcrafted visual leaf image features(shape, color, texture, and preliminary vein properties), their extraction strategies (based on image processing and statistical measures), and classification methods. To do so, a 5-step approach is presented comprising image acquisition, image pre-processing, feature extraction, classification steps, comparison, and evaluation. The presented approach is tested on publicly available standard leaf image datasets such as Flavia, Swedish, and our self-collected BDLeaf20 dataset comprising 20 Bangladeshi local plant species which include fruit, flower, and medicinal plants bearing a total of 1072 leaf images. The plant species included in the BDleaf20 dataset vary in terms of their rarity and popularity within the region. To investigate the effectiveness of the proposed approach, Random Forests classifier is used achieving accuracy scores of 97.21 %,99.11 %, and 93.17% respectively on the Flavia, Swedish, and BDLeaf20 datasets.
Without security, any network system loses its efficiency, reliability, and resilience. With the huge integration of the ICT capabilities, the Electric Vehicle (EV) as a transportation form in cities is becoming more ...
详细信息
暂无评论