Some individuals are unable to use computers due to medical conditions. The idea of eye controls is particularly advantageous for the advancement of natural input as well as, and this is key, for the underprivileged a...
详细信息
ISBN:
(纸本)9789819773558
Some individuals are unable to use computers due to medical conditions. The idea of eye controls is particularly advantageous for the advancement of natural input as well as, and this is key, for the underprivileged and the disabled. Also, they are able to operate the computer autonomously by incorporating a controlling system. It benefits those with disabilities more. Those who can use computers without a keyboard are needed. This one is especially helpful for individuals who can move the cursor with their eyes. In this study, a camera is used to document eye movement. First, find the centre of the pupil of the eye. The pointer will then travel differently depending on the multiple variations in pupil position. All of these programmes share the fact that keyboard and mouse input is the primary technique used while using a personal computer. Although this wouldn't be a problem for someone in good health, it can be an impassable barrier for those with a restricted range of motion in their limbs. In these situations, it would be better to employ input techniques that rely on the brain region's stronger capabilities, such as eye movements. A system that uses a low-cost technique to operate a mouse pointer on a computing device was created to allow such alternative input methods. The eye tracker uses photos captured by a modified webcam to follow the motions of the user's eyes. The computer screen is then graphed using these eye movements to place the mouse pointer appropriately. Automatically altering the location of the eyes while moving the mouse. A webcam is used to photograph eye movement. The mouse cursor can be moved by moving the face up, down, left, and right, and mouse actions may be controlled by speaking and blinking the eyes. Several algorithms, including the Haar Cascade algorithm, Template Matching, and Hough transformation, are utilised to carry out these tasks. Our solution is primarily designed to enable successful computer communication for persons wi
This study is the first to explore whether multi-modal large language models (LLMs) can align their behaviors with visual personas, addressing a significant gap in the literature that predominantly focuses on text-bas...
详细信息
Social media platforms have been expanding their user bases. For example, LinkedIn counts 917 million monthly visitors, while Twitter has 3.62 billion monthly visitors. YouTube has 22.77 billion monthly visitors, and ...
详细信息
Data temperature is a response to the ever-growing amount of *** data have to be stored,but they have been observed that only a small portion of the data are accessed more frequently at any one *** leads to the concep...
详细信息
Data temperature is a response to the ever-growing amount of *** data have to be stored,but they have been observed that only a small portion of the data are accessed more frequently at any one *** leads to the concept of hot and cold *** data can be migrated away from high-performance nodes to free up performance for higher priority *** studies classify hot and cold data primarily on the basis of data age and usage *** present this as a limitation in the current implementation of data *** is due to the fact that age automatically assumes that all new data have priority and that usage is purely *** propose new variables and conditions that influence smarter decision-making on what are hot or cold data and allow greater user control over data location and their *** identify new metadata variables and user-defined variables to extend the current data temperature *** further establish rules and conditions for limiting unnecessary movement of the data,which helps to prevent wasted input output(I/O)*** also propose a hybrid algorithm that combines existing variables and new variables and conditions into a single data *** proposed system provides higher accuracy,increases performance,and gives greater user control for optimal positioning of data within multi-tiered storage solutions.
Money laundering has become a great economic problem with huge consequences on society and financial institutions in the last decade. Current anti-money laundering (AML) procedures within the industry are either ineff...
详细信息
Machine learning classifiers emerge as productive tools to develop prediction models which forecast the final outcome of the students, in a course, and provide an opportunity to the instructor to take appropriate meas...
详细信息
Through their websites, a lot of businesses and people directly offer their services. The way in which these services are offered may affect users emotionally. A website that elicits pleasant emotions in its users can...
详细信息
Glycaemic Variability is one of the main complication diabetes patients' face frequently. Even though smart equipment has been invented for blood glucose levels management, majority of the diabetes patients rely o...
详细信息
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network *** Aerial Vehicle(UAV)communications...
详细信息
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network *** Aerial Vehicle(UAV)communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes.A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this *** the IoT system,the UAV is utilised not only to determine how the resources should be distributed but also to provide power to the wireless *** quality of service(QoS)offered by the cognitive node was interpreted as a price-based utility function,which was demonstrated in the form of a non-cooperative game theory in order to maximise customers’net utility *** energyefficient non-cooperative game theory power allocation with pricing strategy abbreviated as(EE-NGPAP)is implemented in this study with two trajectories Spiral and Sigmoidal in order to facilitate effective power management in Internet of Things(IoT)wireless *** has also been demonstrated,theoretically and by the use of simulations,that the Nash equilibrium does exist and that it is one of a *** proposed energy harvesting approach was shown,through simulations,to significantly reduce the typical amount of power thatwas *** is taken into consideration to agree with the objective of 5G *** order to converge to Nash Equilibrium(NE),the method that is advised only needs roughly 4 iterations,which makes it easier to utilise in the real world,where things aren’t always the same.
This paper investigates the impact of changing distance metrics on the performance of the k-NN classifier. The study investigates the variation in models performance with changing distance metric and value of k in the...
详细信息
暂无评论