In recent years, there has been rapid development in vehicle safety technology, with the emergence of various active safety systems including blind spot information systems, adaptive cruise control, and front collisio...
详细信息
In the modern era of a growing population,it is arduous for humans to monitor every aspect of sports,events occurring around us,and scenarios or *** recognition of different types of sports and events has increasingly...
详细信息
In the modern era of a growing population,it is arduous for humans to monitor every aspect of sports,events occurring around us,and scenarios or *** recognition of different types of sports and events has increasingly incorporated the use of machine learning and artificial *** research focuses on detecting and recognizing events in sequential photos characterized by several factors,including the size,location,and position of people’s body parts in those pictures,and the influence around those *** approaches utilized,here are feature descriptors such as MSER(Maximally Stable Extremal Regions),SIFT(Scale-Invariant Feature Transform),and DOF(degree of freedom)between the joint points are applied to the skeleton ***,for the same purposes,other features such as BRISK(Binary Robust Invariant Scalable Keypoints),ORB(Oriented FAST and Rotated BRIEF),and HOG(Histogram of Oriented Gradients)are applied on full body or *** integration of these techniques increases the discriminative nature of characteristics retrieved in the identification process of the event,hence improving the efficiency and reliability of the entire *** extracted features are passed to the early fusion and DBscan for feature fusion and *** deep belief,network is employed for *** results demonstrate a separate experiment’s detection average recognition rate of 87%in the HMDB51 video database and 89%in the YouTube database,showing a better perspective than the current methods in sports and event identification.
Robotic arms are widely used in the automation industry to package and deliver classified objects. When the products are small objects with very similar shapes, such as screwdriver bits with slightly different threads...
详细信息
This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, ...
详细信息
This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, MotionSense, and PAMAP2—to develop a generalized MLP model for classifying six human activities. Performance analysis of the fused model for each dataset reveals accuracy rates of 95.83 for WISDM, 97 for DaLiAc, 94.65 for MotionSense, and 98.54 for PAMAP2. A comparative evaluation was conducted between the fused MLP model and the individual dataset models, with the latter tested on separate validation sets. The results indicate that the MLP model, trained on the fused dataset, exhibits superior performance relative to the models trained on individual datasets. This finding suggests that multisource data fusion significantly enhances the generalization and accuracy of HAR systems. The improved performance underscores the potential of integrating diverse data sources to create more robust and comprehensive models for activity recognition.
Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, have determined numerous applications across industries, ranging from aerial surveillance to package shipping. As drones are used in vital operations, e...
详细信息
Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, have determined numerous applications across industries, ranging from aerial surveillance to package shipping. As drones are used in vital operations, ensuring cyberattacks and anomalies protect them from attackers is now a big challenge. This research study presents a complete approach to enhancing drone safety by integrating multi-sensor anomaly detection and superior machine learning techniques. The proposed methodology capitalizes on the rich sensor suite embedded in present-day drones, encompassing GPS receivers, accelerometers, gyroscopes, cameras, communication modules, and more. Leveraging an array of sensors in drones, our technique detects abnormal drone behavior indicative of unauthorized access, GPS spoofing, communication jamming, and malicious activities. By extracting features from sensor records, we develop a robust anomaly detection framework using the “uav attack dataset” able to identify deviations from normal flight patterns, communication signals, and environmental interactions. Central to our methodology is the utilization of machine learning algorithms. These algorithms are skilled on labeled datasets containing numerous flight eventualities, each normal and hostile, together with the ones discovered inside the “uav attack dataset”. The obtained results are eventually evaluated using rigorous performance metrics to quantify their effectiveness in distinguishing genuine anomalies from benign variations. The findings of our study underscore the capacity of multi-sensor anomaly detection for drones. By harnessing the power of machine learning and sensor fusion, we exhibit the ability to hit upon attacks at an early level, mitigating capability harm and permitting rapid responses. This study contributes now not only to the field of drone safety but also to the broader panorama of self-sustaining systems protection, highlighting the importance of adaptive and proactive protection mech
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode...
详细信息
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL models are consi-dered“black boxes”with little to no transparency of the underlying mechanisms for end *** previous studies attempted to“open the black box”and increase the interpretability of generated ***,handling complex models on large-scale spatiotemporal data and discovering salient spatial and temporal patterns that significantly influence traffic flow remain *** overcome these challenges,we present TrafPS,a visual analytics approach for interpreting traffic prediction outcomes to support decision-making in traffic management and urban *** measurements region SHAP and trajectory SHAP are proposed to quantify the impact of flow patterns on urban traffic at different *** on the task requirements from domain experts,we employed an interactive visual interface for the multi-aspect exploration and analysis of significant flow *** real-world case studies demonstrate the effectiveness of TrafPS in identifying key routes and providing decision-making support for urban planning.
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tiles in turn until they complete a winning hand. An important notion in Mahjong is the deficiency number(*** number in Japanese Mahjong) of a hand, which estimates how many tile changes are necessary to complete the hand into a winning hand. The deficiency number plays an essential role in major decision-making tasks such as selecting a tile to discard. This paper proposes a fast algorithm for computing the deficiency number of a Mahjong hand. Compared with the baseline algorithm, the new algorithm is usually 100 times faster and, more importantly,respects the agent's knowledge about available tiles. The algorithm can be used as a basic procedure in all Mahjong variants by both rule-based and machine learning-based Mahjong AI.
A computer network can be defined as many computing devices connected via a communication medium like the *** network development has proposed how humans and devices communicate *** networks have improved,facilitated,...
详细信息
A computer network can be defined as many computing devices connected via a communication medium like the *** network development has proposed how humans and devices communicate *** networks have improved,facilitated,and made conventional forms of communication ***,it has also led to uptick in-network threats and *** 2022,the global market for informationtechnology is expected to reach$170.4 ***,in contrast,95%of cyber security threats globally are caused by human *** networks may be utilized in several control systems,such as home-automation,chemical and physical assault detection,intrusion detection,and environmental *** proposed literature review presents a wide range of information on Wireless Social Networks(WSNs)and Internet of Things(IoT)*** aim is first to be aware of the existing issues(issues with traditional methods)and network attacks on WSN and IoT systems and how to defend *** second is to review the novel work in the domain and find its *** goal is to identify the area’s primary gray field or current research divide to enable others to address the ***,we concluded that *** Rapid Spanning Tree Protocol(RSTP)messages have higher efficiency in network performance degradation than alternative Bridge Data Unit Protocol(BPDU)*** research divides our future research into solutions and newly developed techniques that can assist in completing the lacking *** this research,we have selected articles from 2015 to 2021 to provide users with a comprehensive literature overview.
In the realm of smart agriculture, our primary objective is to enhance security in the agriculture field by combining IoT and computer vision technologies. By leveraging these advanced tools, we strive to protect fiel...
详细信息
Person identification based on radar-extracted vital signs has become increasingly popular due to its non-contact measurement capabilities. This paper introduces a novel deep learning-based person identification algor...
详细信息
暂无评论