Crowd counting is an important cornerstone in tasks related to crowd analysis. In recent years, there has been a significant rise in the development of deep learning methods, particularly those based on Convolutional ...
详细信息
The Wireless Sensor Networks(WSN)is a self-organizing network with random deployment of wireless nodes that connects each other for effective monitoring and data *** clustering technique employed to group the collecti...
详细信息
The Wireless Sensor Networks(WSN)is a self-organizing network with random deployment of wireless nodes that connects each other for effective monitoring and data *** clustering technique employed to group the collection of nodes for data transmission and each node is assigned with a cluster *** major concern with the identification of the cluster head is the consideration of energy consumption and hence this paper proposes an hybrid model which forms an energy efficient cluster head in the Wireless Sensor *** proposed model is a hybridization of Glowworm Swarm Optimization(GSO)and Artificial Bee Colony(ABC)algorithm for the better identification of cluster *** performance of the proposed model is compared with the existing techniques and an energy analysis is performed and is proved to be more efficient than the existing model with normalized energy of 5.35%better value and reduction of time complexity upto 1.46%.Above all,the proposed model is 16%ahead of alive node count when compared with the existing methodologies.
Commercial automation has been a powerful device for enhancing productivity, decreasing charges, and increasing performance. In particular, system vision systems have enabled the implementation of advanced automation ...
详细信息
Gender classification is popular because it includes information about male and female social activities. Faces make it difficult to derive gender-discriminating visuals. Gender classification is based on looks. Autom...
详细信息
Ensuring patient privacy is critical for healthcare systems reliant on the Internet of Things. While prior work has addressed patient privacy extensively, a comprehensive end-to-end strategy protecting patients’ loca...
详细信息
The non-stationary of the motor imagery electroencephalography(MI-EEG)signal is one of the main limitations for the development of motor imagery brain-computer interfaces(MI-BCI).The nonstationary of the MI-EEG signal...
详细信息
The non-stationary of the motor imagery electroencephalography(MI-EEG)signal is one of the main limitations for the development of motor imagery brain-computer interfaces(MI-BCI).The nonstationary of the MI-EEG signal and the changes of the experimental environment make the feature distribution of the testing set and training set deviates,which reduces the classification accuracy of *** this paper,we propose a Kullback–Leibler divergence(KL)-based transfer learning algorithm to solve the problem of feature transfer,the proposed algorithm uses KL to measure the similarity between the training set and the testing set,adds support vector machine(SVM)classification probability to classify and weight the covariance,and discards the poorly performing *** results show that the proposed algorithm can significantly improve the classification accuracy of the testing set compared with the traditional algorithms,especially for subjects with medium classification ***,the algorithm based on transfer learning has the potential to improve the consistency of feature distribution that the traditional algorithms do not have,which is significant for the application of MI-BCI.
Citrus disease is a major problem of economic and productive loss in agriculture worldwide. Crops are affected by uneven climatic conditions, which leads to lower agricultural yields. This will affect the world’s agr...
详细信息
With the rapid development of wireless communications,cellular communication and distributed wireless network are fragile to eavesdropping due to distributed users and transparent ***,to adopt bigger transmit power at...
详细信息
With the rapid development of wireless communications,cellular communication and distributed wireless network are fragile to eavesdropping due to distributed users and transparent ***,to adopt bigger transmit power at a given area to interfere potential eavesdroppers not only incurs huge energy waste but also may suppresses regular communication in this *** this end,we focus on secure communication in multi-hop wireless communication network,and propose two communicating while jamming schemes for secure communication in presence of potential eavesdroppers for the narrow band and broad band point-to-point(P2P) systems respectively with the aid of artificial noise transmitted by a chosen cooperative ***,to achieve the end-to-end(E2E) multi-hop secure communication,we devise the secure network topology discovering *** constructing a proper network topology with at least one proper node as the cooperative interferer in each hop,and then propose the secure transmission path planning scheme to find an E2E secure transmission route from source to destination,*** on the wireless open-access research platform demonstrate the feasibility of the proposed ***,simulations results validate that the proposed schemes can achieve better performance compared with existing methods in both the P2P communication case and E2E multi-hop communication network scenario.
Nowadays, the credit card industry is more concerned about credit card fraud than any other problem. The main idea is to examine optional techniques used for fraud detection and to identify the different types of cred...
详细信息
In the near past, interval type-3 fuzzy set theory has been introduced as a more effective means of addressing uncertainty in decision-making than its fuzzy set counterparts. This paper suggests an approach to face re...
详细信息
暂无评论