Steel is one of the important basic industrial raw materials, and the development of steel production technology directly affects the infrastructure construction, the development of manufacturing industry and the pros...
详细信息
Serious games are games that aim for a learning effect. They should increase motivation and commitment of students and thus lead to better learning outcomes. This approach is used at the UAS Campus Vienna, where stude...
详细信息
Vision-based remote non-contact physiological measurements are crucial for detecting indicators (such as heart rate and blood pressure) that reflect important vital signs. This paper introduces the approach proposed b...
详细信息
Image Captioning is an emergent topic of research in the domain of artificial intelligence(AI).It utilizes an integration of computer Vision(CV)and Natural Language Processing(NLP)for generating the image *** use in s...
详细信息
Image Captioning is an emergent topic of research in the domain of artificial intelligence(AI).It utilizes an integration of computer Vision(CV)and Natural Language Processing(NLP)for generating the image *** use in several application areas namely recommendation in editing applications,utilization in virtual assistance,*** development of NLP and deep learning(DL)modelsfind useful to derive a bridge among the visual details and textual *** this view,this paper introduces an Oppositional Harris Hawks Optimization with Deep Learning based Image Captioning(OHHO-DLIC)*** OHHO-DLIC technique involves the design of distinct levels of ***,the feature extraction of the images is carried out by the use of EfficientNet ***,the image captioning is performed by bidirectional long short term memory(BiLSTM)model,comprising encoder as well as *** last,the oppositional Harris Hawks optimization(OHHO)based hyperparameter tuning process is performed for effectively adjusting the hyperparameter of the EfficientNet and BiLSTM *** experimental analysis of the OHHO-DLIC technique is carried out on the Flickr 8k Dataset and a comprehensive comparative analysis highlighted the better performance over the recent approaches.
The automated evaluation and analysis of employee behavior in an Industry 4.0-compliant manufacturingfirm are vital for the rapid and accurate diagnosis of work performance,particularly during the training of a new ***...
详细信息
The automated evaluation and analysis of employee behavior in an Industry 4.0-compliant manufacturingfirm are vital for the rapid and accurate diagnosis of work performance,particularly during the training of a new *** techniques for identifying and detecting worker performance in industrial applications are based on computer vision *** widespread com-puter vision-based approaches,it is challenging to develop technologies that assist the automated monitoring of worker actions at external working sites where cam-era deployment is *** the use of wearable inertial sensors,we propose a deep learning method for automatically recognizing the activities of construction *** suggested method incorporates a convolutional neural network,residual connection blocks,and multi-branch aggregate transformation modules for high-performance recognition of complicated activities such as con-struction worker *** proposed approach has been evaluated using standard performance measures,such as precision,F1-score,and AUC,using a publicly available benchmark dataset known as VTT-ConIoT,which contains genuine con-struction work *** addition,standard deep learning models(CNNs,RNNs,and hybrid models)were developed in different empirical circumstances to compare them to the proposed *** an average accuracy of 99.71%and an average F1-score of 99.71%,the experimentalfindings revealed that the suggested model could accurately recognize the actions of construction ***,we examined the impact of window size and sensor position on the identification efficiency of the proposed method.
With the global increase in the popularity of cryptocurrencies, the need for anomaly detection and fraudulent behavior is reaching an all-Time high. In our paper, we propose a novel method of anomaly detection with th...
详细信息
Data confidentiality is a critical concern in corporate settings, particularly as data analysts seek to uncover trends and insights from sensitive datasets. Traditional approaches often require plaintext data, posing ...
详细信息
ISBN:
(数字)9798350387988
ISBN:
(纸本)9798350387995
Data confidentiality is a critical concern in corporate settings, particularly as data analysts seek to uncover trends and insights from sensitive datasets. Traditional approaches often require plaintext data, posing a significant risk to data privacy during analytics processes. In response to this challenge, homomorphic encryption schemes have emerged as a promising solution to enable secure data analytics while preserving confidentiality. In this work-in-progress paper, we present an ongoing implementation of a homomorphic scheme based on the Data Encryption Standard (DES) as a proof of concept. Our goal is to showcase how DES homomorphic encryption can facilitate secure data analytics by allowing computations on encrypted data without compromising confidentiality. While our work is still in the early stages, we aim to empower data custodians by enabling them to share complete cipher datasets with confidence, knowing that data analytics operations remain blackbox and preserve data availability. Overall, this work represents an ongoing effort to advance data security practices and contribute to the development of practical solutions for secure data analytics.
Meta-heuristic algorithms were effectively utilized in solving a wide array of problems in business, science, data mining, and finance. They are population-based approaches that develop novel optimal solutions based o...
详细信息
Renewable energy resources (RES) are closely linked to grid stability problems. The main challenge of RES is the uncertainty caused by parameters such as irradiation, wind velocity, or temperature. In this connection,...
详细信息
Some of the well-known signature techniques like Winternitz and Lamport are not considered to be very appropriate for the usage of hashing or smart contracts in Blockchains security because of their size O(n2), which ...
详细信息
暂无评论