Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions i...
详细信息
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions in videostreams holds significant importance in computer vision research, as it aims to enhance exercise adherence, enableinstant recognition, advance fitness tracking technologies, and optimize fitness routines. However, existing actiondatasets often lack diversity and specificity for workout actions, hindering the development of accurate recognitionmodels. To address this gap, the Workout Action Video dataset (WAVd) has been introduced as a significantcontribution. WAVd comprises a diverse collection of labeled workout action videos, meticulously curated toencompass various exercises performed by numerous individuals in different settings. This research proposes aninnovative framework based on the Attention driven Residual Deep Convolutional-Gated Recurrent Unit (ResDCGRU)network for workout action recognition in video streams. Unlike image-based action recognition, videoscontain spatio-temporal information, making the task more complex and challenging. While substantial progresshas been made in this area, challenges persist in detecting subtle and complex actions, handling occlusions,and managing the computational demands of deep learning approaches. The proposed ResDC-GRU Attentionmodel demonstrated exceptional classification performance with 95.81% accuracy in classifying workout actionvideos and also outperformed various state-of-the-art models. The method also yielded 81.6%, 97.2%, 95.6%, and93.2% accuracy on established benchmark datasets, namely HMDB51, Youtube Actions, UCF50, and UCF101,respectively, showcasing its superiority and robustness in action recognition. The findings suggest practicalimplications in real-world scenarios where precise video action recognition is paramount, addressing the persistingchallenges in the field. TheWAVd datas
In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite *** ...
详细信息
In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite *** up cache space at any node enables users to access data nearby,thus relieving the processing pressure on the ***,the existing caching strategies still suffer from the lack of global planning of cache contents and low utilization of cache resources due to the lack of fine-grained division of cache *** address the issues mentioned,a cooperative caching strategy(CSTL)for remote sensing satellite networks based on a two-layer caching model is *** two-layer caching model is constructed by setting up separate cache spaces in the satellite network and the ground *** caching of popular contents in the region at the ground station to reduce the access delay of users.A content classification method based on hierarchical division is proposed in the satellite network,and differential probabilistic caching is employed for different levels of *** cached content is also dynamically adjusted by analyzing the subsequent changes in the popularity of the cached *** the two-layer caching model,ground stations and satellite networks collaboratively cache to achieve global planning of cache contents,rationalize the utilization of cache resources,and reduce the propagation delay of remote sensing *** results show that the CSTL strategy not only has a high cache hit ratio compared with other caching strategies but also effectively reduces user request delay and server load,which satisfies the timeliness requirement of remote sensing data transmission.
Aiming to enhance the management stage of Mobile English Interactive Educating in the intelligent flipped classroom mode, a design method of Mobile English Interactive Teaching Based on deep learning is proposed. Extr...
详细信息
The essence of music is inherently multi-modal – with audio and lyrics going hand in hand. However, there is very less research done to study the intricacies of the multi-modal nature of music, and its relation with ...
详细信息
Semi-supervised learning (SSL) aims to reduce reliance on labeled data. Achieving high performance often requires more complex algorithms, therefore, generic SSL algorithms are less effective when it comes to image cl...
详细信息
In the contemporary landscape, autonomous vehicles (AVs) have emerged as a prominent technological advancement globally. Despite their widespread adoption, significant hurdles remain, with security standing out as a c...
详细信息
Autism spectrum disorder (ASD) affects 1 in 100 children globally. Early detection and intervention can enhance life quality for individuals diagnosed with ASD. This research utilizes the support vector machine-recurs...
详细信息
Autism spectrum disorder (ASD) affects 1 in 100 children globally. Early detection and intervention can enhance life quality for individuals diagnosed with ASD. This research utilizes the support vector machine-recursive feature elimination (SVM-RFE) method in its approach for ASD classification using the phenotypic and Automated Anatomical Labeling (AAL) Brain Atlas datasets of the Autism Brain Imaging Data Exchange preprocessed dataset. The functional connectivity matrix (FCM) is computed for the AAL data, generating 6670 features representing pair-wise brain region activity. The SVM-RFE feature selection method was applied five times to the FCM data, thus determining the optimal number of features to be 750 for the best performing support vector machine (SVM) model, corresponding to a dimensionality reduction of 88.76%. Pertinent phenotypic data features were manually selected and processed. Subsequently, five experiments were conducted, each representing a different combination of the features used for training and testing the linear SVM, deep neural networks, one-dimensional convolutional neural networks, and random forest machine learning models. These models are fine-tuned using grid search cross-validation (CV). The models are evaluated on various metrics using 5-fold CV. The most relevant brain regions from the optimal feature set are identified by ranking the SVM-RFE feature weights. The SVM-RFE approach achieved a state-of-the-art accuracy of 90.33% on the linear SVM model using the Data Processing Assistant for Resting-State Functional Magnetic Resonance Imaging pipeline. The SVM model’s ability to rank the features used based on their importance provides clarity into the factors contributing to the diagnosis. The thalamus right, rectus right, and temporal middle left AAL brain regions, among others, were identified as having the highest number of connections to other brain regions. These results highlight the importance of using traditional ML models fo
This research offers a denoising model that organically blends Generative Adversarial Network (GAN) and Kernel Prediction Network (KPN) to address the issue of probable loss of fine details in denoised Monte Carlo pic...
详细信息
Zero-DCE (Zero-reference Deep Curve Estimation) is a widely used method for low-light image enhancement, which is able to adjust the overall brightness, but ignores the problems of area exposure and noise, and is unab...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
暂无评论