Epileptic seizures affect millions of people worldwide. Medical treatments exist to help lessen the severity of the damage caused by these seizures. However, people with epilepsy still struggle with unexpected seizure...
详细信息
Independent human living systems require smart,intelligent,and sustainable online monitoring so that an individual can be assisted *** from ambient assisted living,the task of monitoring human activities plays an impo...
详细信息
Independent human living systems require smart,intelligent,and sustainable online monitoring so that an individual can be assisted *** from ambient assisted living,the task of monitoring human activities plays an important role in different fields including virtual reality,surveillance security,and human interaction with *** systems have been developed in the past with the use of various wearable inertial sensors and depth cameras to capture the human *** this paper,we propose multiple methods such as random occupancy pattern,spatio temporal cloud,waypoint trajectory,Hilbert transform,Walsh Hadamard transform and bone pair descriptors to extract optimal features corresponding to different human *** features sets are then normalized using min-max normalization and optimized using the Fuzzy optimization ***,the Masi entropy classifier is applied for action recognition and *** have been performed on three challenging datasets,namely,UTDMHAD,50 Salad,and *** experimental evaluation,the proposed novel approach of recognizing human actions has achieved an accuracy rate of 90.1%with UTD-MHAD dataset,90.6%with 50 Salad dataset,and 89.5%with CMU-MMAC *** experimental results validated the proposed system.
Signature verification plays an important role in document authentication. The efficient and robust system is required for forgery detection in documents in the presence of distortion such as rotation, scaling and noi...
Signature verification plays an important role in document authentication. The efficient and robust system is required for forgery detection in documents in the presence of distortion such as rotation, scaling and noise. This paper proposes a writer-dependent signature verification method, where hand-crafted features are fused with one-dimensional convolutional neural network features to cater different variance in the whole verification process. Proposed feature extraction methodology is validated by bagged ensemble learning technique in which machine learning classifier’s decision is finalized based on majority voting. The effectiveness of the proposed signature verification approach has been evaluated across three distinct publicly accessible datasets. The outcomes highlight the versatility of this method. Moreover, the proposed system surpasses the performance of other pre-existing systems documented in the literature.
Fog computing enhances traditional cloud computing by bringing resources closer to edge devices, enabling faster response times and supporting mission-critical applications. However, its distributed nature makes it vu...
详细信息
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi...
详细信息
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or createmisleading publicity by using tempered *** forgery detectionmethods can classify only one of the most widely used Copy-Move and splicing ***,an image can contain one or more types of *** study has proposed a hybridmethod for classifying Copy-Move and splicing images using texture information of images in the spatial ***,images are divided into equal blocks to get scale-invariant *** law has been used for getting texture features,and finally,XGBOOST is used to classify both Copy-Move and splicing *** proposed method classified three types of forgeries,i.e.,splicing,Copy-Move,and ***(CASIA 2.0,MICCF200)and RCMFD datasets are used for training and *** average,the proposed method achieved 97.3% accuracy on benchmarked datasets and 98.3% on RCMFD datasets by applying 10-fold cross-validation,which is far better than existing methods.
Cryptography is used by all organizations to protect the data files and ensures confidentiality mainly at the time of sharing and storing in the cloud data storage. The cloud service providers use a wide range of tool...
详细信息
Hard hearing and deaf people are communicating with other people using the sign language. This is the only way of communication of such people to convey Since this is the only means by which these individuals can comm...
详细信息
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho...
详细信息
This study examines the impact of service quality on customer satisfaction and loyalty in the energy sector using the SERVQUAL model. Key dimensions such as reliability, empathy, and physical features were found to si...
详细信息
This research explores the application of LSTM, GRU and Transformer models for predicting stock prices, aiming to enhance accuracy in financial forecasting. Stock price prediction is crucial for investment decision-ma...
详细信息
暂无评论