This paper presents Dynamic Max-Min Johnson scheduling algorithm that offers the optimal sequence. Johnson's rule is perhaps the most classical algorithm in the scheduling field. Dynamic Max-Min Johnson scheduling...
详细信息
This paper introduces the third enhanced version of a genetic algorithm-based technique to allow fast and accurate detection of vehicle plate numbers(VPLN)in challenging image *** binarization of the input image is th...
详细信息
This paper introduces the third enhanced version of a genetic algorithm-based technique to allow fast and accurate detection of vehicle plate numbers(VPLN)in challenging image *** binarization of the input image is the most important and difficult step in the detection of VPLN,a hybrid technique is introduced that fuses the outputs of three fast techniques into a pool of connected components objects(CCO)and hence enriches the solution space with more solution *** to the combination of the outputs of the three binarization techniques,many CCOs are produced into the output pool from which one or more sequences are to be selected as candidate *** pool is filtered and submitted to a new memetic algorithm to select the best fit sequence of CCOs based on an objective distance between the tested sequence and the defined geometrical relationship matrix that represents the layout of the VPLN symbols inside the concerned plate *** any of the previous versions will give moderate results but with very low ***,a new local search is added as a memetic operator to increase the fitness of the best chromosomes based on the linear arrangement of the license plate *** memetic operator speeds up the convergence to the best solution and hence compensates for the overhead of the used hybrid binarization techniques and allows for real-time detection especially after using GPUs in implementing most of the used ***,a deep convolutional network is used to detect false positives to prevent fake detection of non-plate text or similar *** image samples with a wide range of scale,orientation,and illumination conditions have been experimented with to verify the effect of the new *** results with 97.55%detection precision have been reported using the recent challenging public Chinese City Parking Dataset(CCPD)outperforming the author of the dataset by 3.05%and the state-of-the-art technique by
Forecasting retail sales often requires various number of products from different stores. Existing deep or machine learning techniques fall short of producing accurate classification results because of overfitting and...
详细信息
The connection between manufacturers and retailers in the retail industry, as well as supply chain management, depend heavily on sales forecasting. The efficiency of traditional methodologies and methods for completin...
详细信息
Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System(ITS)and reduces road *** major obstacles in automatic detection of tiny vehicles are due to occlus...
详细信息
Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System(ITS)and reduces road *** major obstacles in automatic detection of tiny vehicles are due to occlusion,environmental conditions,illumination,view angles and variation in size of *** research centers on tiny and partially occluded vehicle detection and identification in challenging scene specifically in crowed *** this paper we present comprehensive methodology of tiny vehicle detection using Deep Neural Networks(DNN)namely *** DNN disregards objects that are small in size 5 pixels and more false positives likely to happen in crowded *** there are two categories of deep learning models single-step and two-step.A single forward pass model is the one in which detection is performed directly to possible location over dense sampling,wherein two-step models incorporated by Region proposals followed by object *** in this research scrutinize one-step State of the art(SOTA)model CenteNet as proposed recently with three different feature extractor ResNet-50,HourGlass-104 and ResNet-101 one by *** train our model on challenging KITTI dataset which outperforms in comparison with SOTA single-step technique MSSD300∗which depicts performance improvement by 20.2%mAPandSMOKEby with 13.2%mAP *** of CenterNet can be justified through the huge improved *** performance of our model is evaluated on KITTI(Karlsruhe Institute of technology and Toyota Technological Institute)benchmark dataset with different backbones such as ResNet-50 gives 62.3%mAP ResNet-10182.5%mAP,last but not the least HourGlass-104 outperforms with 98.2%mAP CenterNet-HourGlass-104 achieved high mAP among above mentioned feature *** also compare our model with other SOTA techniques.
Requirement Elicitation is a key phase in software development. The fundamental goal of security requirement elicitation is to gather appropriate security needs and policies from stakeholders or organizations. The maj...
详细信息
Missing values are the major problem in a time - series dataset that led to a very typical phenomenon in a dataset analysis. Better analysis of a dataset in ubiquitous computing can only be achieved after efficiently ...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT *** rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT *** DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT *** BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal *** experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy *** are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack *** method,without feature selection,demonstrates advantages in training time and detection ***,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.
Internet of Things (IoT) technology quickly transformed traditional management and engagement techniques in several sectors. This work explores the trends and applications of the Internet of Things in industries, incl...
详细信息
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc...
详细信息
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and *** articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility *** study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network *** findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network *** paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures.
暂无评论