In the last years of this decade, the recognition of human activity has become important to a wide range of researchers in pattern recognition and human-computer interaction as a result of its wide range of real-world...
In the last years of this decade, the recognition of human activity has become important to a wide range of researchers in pattern recognition and human-computer interaction as a result of its wide range of real-world applications, such as gesture recognition, biometric user identification, surveillance by authorities, behavior analysis and health monitoring of the elderly. Human Activity Recognition (HAR) has become a significant topic in mobile and ubiquitous computing as a result of the widespread use of wearable sensor devices and the Internet of Things (loT). Deep Learning (DL) is one of the most commonly used problem-solving techniques in the HAR system. Nevertheless, there are major challenges in applying HAR to problems in recognizing various human activities. In this paper, presented and showed the activities of implementing a new combination of DL methods for multi-class user activity identification to HAR. Using DL methods can be extracting discriminative features automatically from raw sensor data. Specifically, in this work, we proposed a hybrid architecture that features a combination of Bidirectional Long Short-Term Memory (BILSTM) networks and support vector Machines (SVM) for the HAR task. The UCI HAR dataset is used to test the model, it consists of accelerometer and gyroscope data obtained from smartphones. The dataset is split into 30 % for testing and 70% for training. The results for the (BILSTM-SVM) model, showed that the highest accuracy for all users was 98.74 %, higher than all previous models using the same dataset.
The load transient response of a power converter is an important property, especially in a test equipment application. The dynamic behavior of a dual active bridge converter mainly depends on the switching frequency, ...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and *** learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit *** intrusion detection system controls the flow of network traffic with the help of computer *** deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network *** this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network *** Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious *** proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection.
In this paper, engagement with smart medical wearables and with their user manuals, as well as related user behavior are studied. A research questionnaire containing 15 single-choice questions was completed by 1381 te...
详细信息
In pharmaceutical industry, dissolution testing is part of the target product quality that essentials are in the approval of new products. The prediction of the dissolution profile based on spectroscopic data is an al...
详细信息
We present a generic framework for data augmentation via dependency subtree swapping that is applicable to machine translation. We extract corresponding subtrees from the dependency parse trees of the source and targe...
详细信息
We introduce HunSum-1: a dataset for Hungarian abstractive summarization, consisting of 1.14M news articles. The dataset is built by collecting, cleaning and deduplicating data from 9 major Hungarian news sites throug...
详细信息
This paper presents a small number of MATLAB APPs and livescript files designed to help students both understand and implement PID tuning. The paper presents the thinking behind the use of MATLAB and the topic itself ...
详细信息
This paper presents a small number of MATLAB APPs and livescript files designed to help students both understand and implement PID tuning. The paper presents the thinking behind the use of MATLAB and the topic itself before then describing the proposed resources in detail. The resources split into files with detailed mathematical and coding background students can use for self-study and assignments, and a virtual laboratory which is more intuitive and interactive and useful for familiarisation with core concepts. The files were recently added to the control101 toolbox (Rossiter, 2023).
An in-depth understanding of the particular environment is crucial in reinforcement learning (RL). To address this challenge, the decision-making process of a mobile collaborative robotic assistant modeled by the Mark...
详细信息
Proximal Policy Optimization (PPO) is among the most widely used algorithms in reinforcement learning, which achieves state-of-the-art performance in many challenging problems. The keys to its success are the reliable...
详细信息
暂无评论