The big data clustering is a requisite for generating the data in the digitalised globe. The old-fashioned clustering approaches are not large sized and highly unorganised big data. Thus, to obtain the efficiency of b...
详细信息
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past *** of the most tedious tasks is to track a suspect once a crime is *** most ...
详细信息
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past *** of the most tedious tasks is to track a suspect once a crime is *** most of the crimes are committed by individuals who have a history of felonies,it is essential for a monitoring system that does not just detect the person’s face who has committed the crime,but also their ***,a smart criminal detection and identification system that makes use of the OpenCV Deep Neural Network(DNN)model which employs a Single Shot Multibox Detector for detection of face and an auto-encoder model in which the encoder part is used for matching the captured facial images with the criminals has been *** detection and extraction of the face in the image by face cropping,the captured face is then compared with the images in the *** comparison is performed by calculating the similarity value between each pair of images that are obtained by using the Cosine Similarity *** plotting the values in a graph to find the threshold value,we conclude that the confidence rate of the encoder model is 0.75 and above.
Polycystic Ovary Syndrome (PCOS) is a recurring endocrine disorder that primarily affects women of reproductive age. It is difficult to diagnose due to its heterogeneous characteristics and overlapping symptoms with o...
详细信息
Web Navigation Prediction (WNP) has been popularly used for finding future probable web pages. Obtaining relevant information from a large web is challenging, as its size is growing with every second. Web data may con...
详细信息
The Intelligent Surveillance Support System(ISSS) is an innovative software solution that enables real-time monitoring and analysis of security footage to detect and identify potential threats. This system incorporate...
详细信息
The ubiquity of handheld devices and easy access to the Internet help users get easy and quick updates from social media. Generally, people share information with their friends and groups without inspecting the posts...
详细信息
The reliability and operational efficiency of rotating machinery have become increasingly vital across various industries. Using Fibre Bragg Grating (FBG) vibration sensors, this study investigates the use of Machine ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Personalized recommender systems are becoming more popular to reduce the issue of information overload. It is also observed that the recommendations provided by multi-criteria recommender system (MCRS) are more accura...
详细信息
Lightweight video representation techniques have advanced significantly for simple activity recognition, but they still encounter several issues when applied to complex activity recognition: (i) The presence of numero...
详细信息
暂无评论