Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra...
详细信息
In order to maintain sustainable agriculture, it is vital to monitor plant health. Since all species of plants are prone to characteristic diseases, it necessitates regular surveillance to search for any symptoms, whi...
详细信息
With the evolvement of the Internet of things(IoT), mobile edge computing(MEC) has emerged as a promising computing paradigm to support IoT data analysis and processing. In MEC for IoT, the differentiated requirements...
详细信息
With the evolvement of the Internet of things(IoT), mobile edge computing(MEC) has emerged as a promising computing paradigm to support IoT data analysis and processing. In MEC for IoT, the differentiated requirements on quality of service(QoS) have been growing rapidly, making QoS a multi-dimensional concept including several attributes, such as performance, dependability, energy efficiency, and economic factors. To guarantee the QoS of IoT applications, theories and techniques of multi-dimensional QoS evaluation and optimization have become important theoretical foundations and supporting technologies for the research and application of MEC for IoT,which have attracted significant attention from both academia and industry. This paper aims to survey the existing studies on multi-dimensional QoS evaluation and optimization of MEC for IoT, and provide insights and guidance for future research in this field. This paper summarizes the multi-dimensional and multi-attribute QoS metrics in Io T scenarios, and then several QoS evaluation methods are presented. For QoS optimization, the main research problems in this field are summarized, and optimization models as well as their corresponding solutions are elaborated. We take notice of the booming of edge intelligence in artificial intelligence-empowered Io T scenarios, and illustrate the new research topics and the state-of-the-art approaches related to QoS evaluation and optimization. We discuss the challenges and future research directions.
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)syste...
详细信息
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)system takes an input expression from a hearing or speaking-impaired person and outputs it in the form of text or voice to a normal *** existing study related to the Sign Language Recognition system has some drawbacks,such as a lack of large datasets and datasets with a range of backgrounds,skin tones,and *** research efficiently focuses on Sign Language Recognition to overcome previous *** importantly,we use our proposed Convolutional Neural Network(CNN)model,“ConvNeural”,in order to train our ***,we develop our own datasets,“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”,both of which have ambiguous backgrounds.“BdSL_OPSA22_STATIC1”and“BdSL_OPSA22_STATIC2”both include images of Bangla characters and numerals,a total of 24,615 and 8437 images,***“ConvNeural”model outperforms the pre-trained models with accuracy of 98.38%for“BdSL_OPSA22_STATIC1”and 92.78%for“BdSL_OPSA22_STATIC2”.For“BdSL_OPSA22_STATIC1”dataset,we get precision,recall,F1-score,sensitivity and specificity of 96%,95%,95%,99.31%,and 95.78%***,in case of“BdSL_OPSA22_STATIC2”dataset,we achieve precision,recall,F1-score,sensitivity and specificity of 90%,88%,88%,100%,and 100%respectively.
In today's changing world businesses are increasingly relying on private cloud solutions to meet their specific needs, for growth and effectiveness. This research paper explores the realm of cloud computing with a...
详细信息
Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transp...
详细信息
Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transportationsystem. The movement of vehicles and the three-dimensional (3D) nature of the road network cause the topologicalstructure of IoV to have the high space and time *** modeling and structure recognition for 3Droads can benefit the description of topological changes for IoV. This paper proposes a 3Dgeneral roadmodel basedon discrete points of roads obtained from GIS. First, the constraints imposed by 3D roads on moving vehicles areanalyzed. Then the effects of road curvature radius (Ra), longitudinal slope (Slo), and length (Len) on speed andacceleration are studied. Finally, a general 3D road network model based on road section features is *** paper also presents intersection and road section recognition methods based on the structural features ofthe 3D road network model and the road features. Real GIS data from a specific region of Beijing is adopted tocreate the simulation scenario, and the simulation results validate the general 3D road network model and therecognitionmethod. Therefore, thiswork makes contributions to the field of intelligent transportation by providinga comprehensive approach tomodeling the 3Droad network and its topological changes in achieving efficient trafficflowand improved road safety.
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing ***...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing *** cloud service provider fulfills different user requirements using virtualization-where a single physical machine can host multiple *** virtualmachine potentially represents a different user environment such as operating system,programming environment,and ***,these cloud services use a large amount of electrical energy and produce greenhouse *** reduce the electricity cost and greenhouse gases,energy efficient algorithms must be *** specific area where energy efficient algorithms are required is virtual machine *** virtualmachine consolidation,the objective is to utilize the minimumpossible number of hosts to accommodate the required virtual machines,keeping in mind the service level agreement *** research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized *** online algorithm is analyzed using a competitive analysis *** addition,an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark *** proposed online algorithm consumed 25%less energy and performed 43%fewer migrations than the benchmark algorithms.
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing *** Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Lan...
详细信息
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing *** Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Language(JSL)for ***,existing JSL recognition systems have faced significant performance limitations due to inherent *** response to these challenges,we present a novel JSL recognition system that employs a strategic fusion approach,combining joint skeleton-based handcrafted features and pixel-based deep learning *** system incorporates two distinct streams:the first stream extracts crucial handcrafted features,emphasizing the capture of hand and body movements within JSL ***,a deep learning-based transfer learning stream captures hierarchical representations of JSL gestures in the second ***,we concatenated the critical information of the first stream and the hierarchy of the second stream features to produce the multiple levels of the fusion features,aiming to create a comprehensive representation of the JSL *** reducing the dimensionality of the feature,a feature selection approach and a kernel-based support vector machine(SVM)were used for the *** assess the effectiveness of our approach,we conducted extensive experiments on our Lab JSL dataset and a publicly available Arabic sign language(ArSL)*** results unequivocally demonstrate that our fusion approach significantly enhances JSL recognition accuracy and robustness compared to individual feature sets or traditional recognition methods.
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource *** study proposes a lightweight and efficient authentication scheme for *** proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardwarebased solution with a simple *** proposed scheme works in four stages:system initialization,EU registration,EU authentication,and session *** is implemented as a single hardware chip comprising registers and XOR gates,and it can run the entire process in one clock ***,the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the *** are conducted to evaluate the proposed authentication *** results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 *** hardware execution time is approximately 0.39 ns,which is a significantly less than the prevalent schemes,whose execution times range in ***,the security of the proposed scheme is examined,and it is resistant to brute-force *** 1.158×10^(77) trials are required to overcome the system’s security,which is not feasible using fastest available processors.
Reinforcement learning (RL)-based Brain-Machine Interfaces (BMIs) hold promise for restoring motor functions in paralyzed individuals. These interfaces interpret neural activity to control external devices through tri...
详细信息
暂无评论