Gender identification from videos is a challenging task with significant real-world applications, such as video content analysis and social behavior research. In this study, we propose a novel approach, the White Shar...
详细信息
Recognising a person with just one face or ear image is a challenging sub-problem in the field of biometric recognition. The difficulty arises as parameter estimation becomes challenging from a single image. This arti...
详细信息
The early Alzheimer’s disease (AD) classification is highly important as this neuro-degenerative disease causes severe problems particularly, loss of memory among the patients. In addition, classifying Normal Control...
详细信息
The present study advances object detection and tracking techniques by proposing a novel model combining Automated Image Annotation with Inception v2-based Faster RCNN (AIA-IFRCNN). The research methodology utilizes t...
详细信息
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Chann...
详细信息
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Channel State Information(CSI).In this paper,we formulate the problem of sum throughput maximization as a Mixed Integer Non-Linear Programming(MINLP)*** problem is solved in two stages:a tripartite graph-based resource allocation stage and a time-scale optimization *** proposed approach prioritizes maintaining Quality of Service(QoS)and resource allocation to minimize power consumption while maximizing sum *** results demonstrate the superiority of the proposed algorithm over standard benchmark *** of the proposed algorithm using performance parameters such as sum throughput shows improvements ranging from 17%to 93%.Additionally,the average time to deliver resources to CSI users is minimized by 60.83%through optimal power *** approach ensures QoS requirements are met,reduces system signaling overhead,and significantly increases D2D sum throughput compared to the state-of-the-art *** proposed methodology may be well-suited to address the challenges SIoT applications,such as home automation and higher education systems.
The big data processing framework Spark is used to power a parameterizable recommender system that can make recommendations for music based on a user’s individual tastes and take into account a variety of musical ton...
详细信息
This paper presents MACPGANA, a novel multimodal agriculture commodity price prediction model leveraging Generative Adversarial Networks (GAN) and Autoencoders (AEs). The model integrates multimodal data to extract an...
详细信息
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of hete...
详细信息
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of heterogeneous big data as a consequence of the growth of power grid technologies,along with data processing and advanced *** main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information *** original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI ***,an AdaBelief Exponential Feature Selection(AEFS)technique is used to efficiently handle the input huge datasets from the smart grid for boosting ***,a Kernel based Extreme Neural Network(KENN)technique is used to anticipate security vulnerabilities more *** Polar Bear Optimization(PBO)algorithm is used to efficiently determine the parameters for the estimate of radial basis ***,several types of smart grid network datasets are employed during analysis in order to examine the outcomes and efficiency of the proposed AdaBelief Exponential Feature Selection-Kernel based Extreme Neural Network(AEFS-KENN)big data security *** results reveal that the accuracy of proposed AEFS-KENN is increased up to 99.5%with precision and AUC of 99%for all smart grid big datasets used in this study.
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining ...
详细信息
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining images obtained from both modalities allows for leveraging their respective strengths and mitigating individual limitations,resulting in high-quality images with enhanced contrast and rich texture *** capabilities hold promising applications in advanced visual tasks including target detection,instance segmentation,military surveillance,pedestrian detection,among *** paper introduces a novel approach,a dual-branch decomposition fusion network based on AutoEncoder(AE),which decomposes multi-modal features into intensity and texture information for enhanced *** contrast enhancement module(CEM)and texture detail enhancement module(DEM)are devised to process the decomposed images,followed by image fusion through the *** proposed loss function ensures effective retention of key information from the source images of both *** comparisons and generalization experiments demonstrate the superior performance of our network in preserving pixel intensity distribution and retaining texture *** the qualitative results,we can see the advantages of fusion details and local *** the quantitative experiments,entropy(EN),mutual information(MI),structural similarity(SSIM)and other results have improved and exceeded the SOTA(State of the Art)model as a whole.
In this paper, we have analyzed the impact of improper implementation of Transport Layer Security (TLS) in Android applications. Communication security in Android applications is largely dependent on Transport Layer S...
详细信息
暂无评论