作者:
Shiju Thomas, M.Y.Krishna, Addapalli V N
Department of Computer Science Kerala India
Department of Computer Science and Engineering Karnataka Bangalore India
Image disarranging is the process of randomly rearranging picture elements to make the visibility unreadable and break the link among neighboring elements. Pixel values often don't change while they are being scra...
详细信息
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are...
详细信息
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are multiple applications available in this area but the challenge is open due to complexity of crowd and depends on the *** this paper,we have proposed a new method for pedestrian’s behavior *** filter has been used to detect pedestrian’s usingmovement based ***,we have performed occlusion detection and removal using region shrinking method to isolate occluded *** verification is performed on each human silhouette and wavelet analysis and particle gradient motion are extracted for each *** Wolf Optimizer(GWO)has been utilized to optimize feature set and then behavior classification has been performed using the Extreme Gradient(XG)Boost *** has been evaluated using pedestrian’s data from avenue and UBI-Fight datasets,where both have different *** mean achieved accuracies are 91.3%and 85.14%over the Avenue and UBI-Fight datasets,*** results are more accurate as compared to other existing methods.
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo...
详细信息
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various network intrusion detection systems(NIDS) to monitor network traffic. However, the incessant emergence of new attack techniques and the lack of system interpretability pose challenges to improving the detection performance of NIDS. To address these issues, this paper proposes a hybrid explainable neural network-based framework that improves both the interpretability of our model and the performance in detecting new attacks through the innovative application of the explainable artificial intelligence(XAI)method. We effectively introduce the Shapley additive explanations(SHAP) method to explain a light gradient boosting machine(Light GBM) model. Additionally, we propose an autoencoder long-term short-term memory(AE-LSTM) network to reconstruct SHAP values previously generated. Furthermore, we define a threshold based on reconstruction errors observed during the training phase. Any network flow that surpasses the specified threshold is classified as an attack flow. This approach enhances the framework's ability to accurately identify attacks. We achieve an accuracy of 92.65%, a recall of 95.26%, a precision of 92.57%,and an F1-score of 93.90% on the dataset NSL-KDD. Experimental results demonstrate that our approach generates detection performance on par with state-of-the-art methods.
Handwritten documents generated in our day-to-day office work, class room and other sectors of society carry vital information. Automatic processing of these documents is a pipeline of many challenging steps. The very...
详细信息
Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evalua...
详细信息
Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evaluation to attributes and hidden information derived from ***,when the weight of attributes is researched,it is necessary to consider weight from subjective and objective ***,a novel weight allocation method is proposed by combining the fuzzy analytical hierarchy process(FAHP)method and the criteria importance though intercrieria correlation(CRITIC)***,based on the weight allocation method,the trustworthiness measurement models of component-based software are estab-lished according to the seven combination structures of ***,the model reasonability is verified via proving some metric ***,a case is carried *** to the comparison with other models,the result shows that the model has the advantage of utilizing hidden information fully and analyzing the com-bination of components *** is an important guide for measuring the trustworthiness measurement of component-based software.
Diabetic wound takes longer time to heal due to micro and macro-vascular *** longer healing time can lead to infections and other health *** ulcers are one of the most common diabetic *** are one of the leading cause ...
详细信息
Diabetic wound takes longer time to heal due to micro and macro-vascular *** longer healing time can lead to infections and other health *** ulcers are one of the most common diabetic *** are one of the leading cause of *** science is continuously striving for improving quality of human life.A recent trend of amalgamation of knowledge,efforts and technological advancement of medical science experts and artificial intelligence researchers,has made tremendous success in diagnosis,prognosis and treatment of a variety of *** wounds are no exception,as artificial intelligence experts are putting their research efforts to apply latest technological advancements in the field to help medical care personnel to deal with diabetic wounds in more effective *** presented study reviews the diagnostic and treatment research under the umbrella of Artificial Intelligence and computational science,for diabetic wound *** for diabetic wound assessment using artificial intelligence is ***,this review is focused on existing and potential contribution of artificial intelligence to improve medical services for diabetic wound *** article also discusses the future directions for the betterment of the field that can lead to facilitate both,clinician and patients.
ASR is an effectual approach, which converts human speech into computer actions or text format. It involves extracting and determining the noise feature, the audio model, and the language model. The extraction and det...
详细信息
作者:
Appiah, ObedMartey, Ezekiel Mensah
Department of Computer Science and Informatics Sunyani Ghana
Department of Computer Science and Engineering Tarkwa Ghana
The domain of image analysis has seen rapid advancements, particularly feature extraction techniques, driven by the increasing demand for accurate and efficient results. Among these advancements, Local Binary Patterns...
详细信息
As containerization continues to gain prominence in modern application deployment, the need for efficient autoscaling mechanisms becomes paramount to ensure optimal resource utilization and adherence to service level ...
详细信息
暂无评论