This paper proposes a new chaos-based extremum coding method to realize a true random number generator (RNG). Based on the chain rule, we innovatively introduce two parameters into the dynamics of chaotic systems to m...
详细信息
Road traffic monitoring is an imperative topic widely discussed among *** used to monitor traffic frequently rely on cameras mounted on bridges or ***,aerial images provide the flexibility to use mobile platforms to d...
详细信息
Road traffic monitoring is an imperative topic widely discussed among *** used to monitor traffic frequently rely on cameras mounted on bridges or ***,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger *** this end,different models have shown the ability to recognize and track ***,these methods are not mature enough to produce accurate results in complex road ***,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image *** extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the *** masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring ***,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise *** preprocessing,the blob detection algorithm helped detect the *** of varying sizes have been detected by implementing a dynamic thresholding *** was done on the first image of every ***,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching *** further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple *** accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been *** the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis...
详细信息
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development *** frameworks have been developed focusing on guiding software systemmanagers concerning offshore software ***,none of these studies delivered comprehensive guidelines for managing the whole process of *** is a considerable lack of research working on managing OSMO from a vendor’s ***,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s *** study validated the preliminary OSMO process model via a case study research *** results showed that the OSMO process model is applicable in an industrial setting with few *** industrial data collected during the case study enabled this paper to extend the preliminary OSMO process *** refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk.
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request ar...
详细信息
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request arrival *** classical intrusion detection system(IDS)is not a practical solution to the Industry 4.0 environment owing to the resource limitations and *** resolve these issues,this paper designs a new Chaotic Cuckoo Search Optimiza-tion Algorithm(CCSOA)with optimal wavelet kernel extreme learning machine(OWKELM)named CCSOA-OWKELM technique for IDS on the Industry 4.0 *** CCSOA-OWKELM technique focuses on the design of feature selection with classification approach to achieve minimum computation complex-ity and maximum detection *** CCSOA-OWKELM technique involves the design of CCSOA based feature selection technique,which incorpo-rates the concepts of chaotic maps with ***,the OWKELM technique is applied for the intrusion detection and classification *** addition,the OWKELM technique is derived by the hyperparameter tuning of the WKELM technique by the use of sunflower optimization(SFO)*** utilization of CCSOA for feature subset selection and SFO algorithm based hyperparameter tuning leads to better *** order to guarantee the supreme performance of the CCSOA-OWKELM technique,a wide range of experiments take place on two benchmark datasets and the experimental outcomes demonstrate the promis-ing performance of the CCSOA-OWKELM technique over the recent state of art techniques.
In this paper, Precision agriculture uses the latest technology like the IOT and Artificial Intelligence to achieve more productivity and better resource utilization than traditional ways, resulting in lower costs and...
详细信息
In recent years, cloud-native applications have been widely hosted and managed in containerized environments due to their unique benefits, such as being lightweight, portable, and cost-efficient. Their growing popular...
详细信息
This research project focuses on utilizing machine learning techniques to predict loan default among applicants in the context of financial organizations. Loan approval decisions carry substantial risks, and not all a...
详细信息
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste...
详细信息
Extended reality (XR) and 6G networks are set to transform mobile immersive experiences, with privacy and security being paramount in XR communications. Achieving secure and reliable XR experiences while meeting high-...
详细信息
暂无评论