Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det...
详细信息
This study addresses the pressing need for computer systems to interpret digital media images with a level of sophistication comparable to human visual perception. By leveraging Convolutional Neural Networks (CNNs), w...
详细信息
Considering the fact that the test case runs abnormally and the test case execution fails during the development and debugging of the 5G terminal protocol conformance test system. Here useful approach is implemented b...
详细信息
Robotic Process Automation (RPA) uses software to mimic human actions in performing repetitive, time-consuming tasks, enabling organizations to strategically reallocate their workforce towards more value-driven activi...
详细信息
In this research work,an efficient sign language recognition tool for e-learning has been proposed with a new type of feature set based on angle and *** feature set has the ability to increase the overall performance ...
详细信息
In this research work,an efficient sign language recognition tool for e-learning has been proposed with a new type of feature set based on angle and *** feature set has the ability to increase the overall performance of machine learning algorithms in an efficient *** hand gesture recognition based on these features has been implemented for usage in *** feature set used hand landmarks,which were generated using media-pipe(MediaPipe)and open computer vision(openCV)on each frame of the incoming *** overall algorithm has been tested on two well-known ASLalphabet(American Sign Language)and ISL-HS(Irish Sign Language)sign language *** machine learning classifiers including random forest,decision tree,and naïve Bayesian have been used to classify hand gestures using this unique feature set and their respective results have been *** the random forest classifier performed better,it has been selected as the base classifier for the proposed *** showed 96.7%accuracy with ISL-HS and 93.7%accuracy with ASL-alphabet dataset using the extracted features.
Aiming at the low matching accuracy of existing local stereo matching algorithms in weak texture areas, a local stereo matching algorithm based on multi-matching cost fusion and guided filtering cost aggregation with ...
详细信息
The conventional Levenberg-Marquardt (LM) algorithm is a state-of-the-art trust-region optimization method for solving bundle adjustment problems in the Structure-from-Motion community, which not only takes advantage ...
详细信息
Creating accurate and insightful personas for automotive applications requires understanding the diverse driving styles that emerge from sensor data. This paper introduces initial results of our methodology for develo...
详细信息
we propose a cutting-edge solution that leverages passive adaptive methods based on ensemble learning to effectively detect anomalous traffic in data streams. Our approach tackles the issue of concept drift by integra...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy *** present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of *** this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model *** experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.
暂无评论