Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military *** make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the *** data have to be picked up by the sensor,and then sent to the sink node where they may be *** nodes of the WSNs are powered by batteries,therefore they eventually run out of *** energy restriction has an effect on the network life span and environmental *** objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of *** lifespan of WSNs is being extended often using clustering and routing *** Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do *** cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node *** on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS *** overall experimentation is carried out under the MATLAB *** the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption.
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets ...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected *** detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual *** learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device *** addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to *** ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT *** overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)*** GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT *** data preprocessing,the min-max data normalization approach is primarily *** GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature ***,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet ***,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM *** experimental validation of the GTODL-BADC technique can be tested on a benchmark *** simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.
Most optimization problems of practical significance are typically solved by highly configurable parameterized *** achieve the best performance on a problem instance,a trial-and-error configuration process is required...
详细信息
Most optimization problems of practical significance are typically solved by highly configurable parameterized *** achieve the best performance on a problem instance,a trial-and-error configuration process is required,which is very costly and even prohibitive for problems that are already computationally intensive,*** problems associated with machine learning *** the past decades,many studies have been conducted to accelerate the tedious configuration process by learning from a set of training *** article refers to these studies as learn to optimize and reviews the progress achieved.
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)syste...
详细信息
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)system takes an input expression from a hearing or speaking-impaired person and outputs it in the form of text or voice to a normal *** existing study related to the Sign Language Recognition system has some drawbacks,such as a lack of large datasets and datasets with a range of backgrounds,skin tones,and *** research efficiently focuses on Sign Language Recognition to overcome previous *** importantly,we use our proposed Convolutional Neural Network(CNN)model,“ConvNeural”,in order to train our ***,we develop our own datasets,“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”,both of which have ambiguous backgrounds.“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”both include images of Bangla characters and numerals,a total of 24,615 and 8437 images,***“ConvNeural”model outperforms the pre-trained models with accuracy of 98.38%for“BdSL_OPSA22_STATIC1”and 92.78%for“BdSL_OPSA22_STATIC2”.For“BdSL_OPSA22_STATIC1”dataset,we get precision,recall,F1-score,sensitivity and specificity of 96%,95%,95%,99.31%,and 95.78%***,in case of“BdSL_OPSA22_STATIC2”dataset,we achieve precision,recall,F1-score,sensitivity and specificity of 90%,88%,88%,100%,and 100%respectively.
Video colorization aims to add color to grayscale or monochrome *** existing methods have achieved substantial and noteworthy results in the field of image colorization,video colorization presents more formidable obst...
详细信息
Video colorization aims to add color to grayscale or monochrome *** existing methods have achieved substantial and noteworthy results in the field of image colorization,video colorization presents more formidable obstacles due to the additional necessity for temporal ***,there is rarely a systematic review of video colorization *** this paper,we aim to review existing state-of-the-art video colorization *** addition,maintaining spatial-temporal consistency is pivotal to the process of video *** gain deeper insight into the evolution of existing methods in terms of spatial-temporal consistency,we further review video colorization methods from a novel *** colorization methods can be categorized into four main categories:optical-flow based methods,scribble-based methods,exemplar-based methods,and fully automatic ***,optical-flow based methods rely heavily on accurate optical-flow estimation,scribble-based methods require extensive user interaction and modifications,exemplar-based methods face challenges in obtaining suitable reference images,and fully automatic methods often struggle to meet specific colorization *** also discuss the existing challenges and highlight several future research opportunities worth exploring.
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua...
详细信息
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer(CRC)in clinical ***,due to scale variation and blurry polyp boundaries,it is still a challenging task to achieve satisfac...
详细信息
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer(CRC)in clinical ***,due to scale variation and blurry polyp boundaries,it is still a challenging task to achieve satisfactory segmentation performance with different scales and *** this study,we present a novel edge-aware feature aggregation network(EFA-Net)for polyp segmentation,which can fully make use of cross-level and multi-scale features to enhance the performance of polyp ***,we first present an edge-aware guidance module(EGM)to combine the low-level features with the high-level features to learn an edge-enhanced feature,which is incorporated into each decoder unit using a layer-by-layer ***,a scale-aware convolution module(SCM)is proposed to learn scale-aware features by using dilated convolutions with different ratios,in order to effectively deal with scale ***,a cross-level fusion module(CFM)is proposed to effectively integrate the cross-level features,which can exploit the local and global contextual ***,the outputs of CFMs are adaptively weighted by using the learned edge-aware feature,which are then used to produce multiple side-out segmentation *** results on five widely adopted colonoscopy datasets show that our EFA-Net outperforms state-of-the-art polyp segmentation methods in terms of generalization and *** implementation code and segmentation maps will be publicly at https://***/taozh2017/EFANet.
暂无评论