This research presents a dual-pathway SlowFast network in order to provide a novel approach for the recognition of human actions. The method has the ability to capture low-intensity as well as high-intensity activitie...
详细信息
ISBN:
(数字)9798331522100
ISBN:
(纸本)9798331522117
This research presents a dual-pathway SlowFast network in order to provide a novel approach for the recognition of human actions. The method has the ability to capture low-intensity as well as high-intensity activities efficiently. The model is trained on two different datasets: one on the routine activities, such as sitting and walking, and the other on complex sports and leisure activities. The SlowFast network increases the accuracy in a wide variety of scenarios by incorporating high-level spatial context along with fast motion characteristics using a dual-path architecture. The proposed model outperforms the conventional HAR methods on different grounds such as adaptability and accuracy, and thus aptly useful for applications such as security surveillance, healthcare, and sports analysis. This approach brings forth a robust system able to identify a range of human actions in static as well as dynamic environments by removing some of the limitations from existing HAR models.
Hybrid active-passive radar (HAPR) can effectively reduce the radiation power of active nodes, thus improving the radar system's electromagnetic environmental friendliness and anti-interception capability. Meanwhi...
详细信息
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ...
详细信息
ISBN:
(数字)9798331509675
ISBN:
(纸本)9798331509682
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods struggle due to the data used to train is different from data used later this is known as Domain shifts. This project uses a hybrid model known as Domain-Adversarial Training of Neural Networks (DANN) with Invariant Risk Minimization (IRM) Hybrid Method to identification of the tumor in the breast. Through integrating the (DANN) and IRM works perfectly among the various type of data and also with the various image from the various sources. This model is more precise and reliable than any other older *** that this model act as an effective tool for detecting the breast cancer in the early stages.
Mobile edge computing (MEC) is an evolving paradigm for rendering services through network-accessible resources deployed over Internet of Things (IoT) nodes at the edge. Nevertheless, an MEC environment usually employ...
详细信息
computer vision has emerged as a promising technology with numerous applications in healthcare. This systematic review provides an overview of advancements and challenges associated with computer vision in healthcare....
详细信息
This study proposes an effective approach to reconstruct the multi-physics field of the active phased array antenna (APAA) through limited information of temperature and strain. First, the multi-physics coupling model...
详细信息
The PMC model is the test-based diagnosis in which a node performs the diagnosis by testing the neighbor nodes via the links between them. If we concentrate on the status of some nodes then instead of doing the global...
The PMC model is the test-based diagnosis in which a node performs the diagnosis by testing the neighbor nodes via the links between them. If we concentrate on the status of some nodes then instead of doing the global test, Hsu and Tan proposed the concept of local diagnosis and two structures to diagnose a node under the PMC model. To better evaluate the local diagnosability of a node, we propose a new structure and the related algorithm to diagnose a node under the PMC model in this paper. Applying the two structures proposed by Hsu and Tan, and the new structure we propose in this paper, we determine the accurate value of the local diagnosability of each node in matching composition networks. Simulation results are presented, showing the performance of our algorithm. It shows that even if the failure probability of a node is 0.4, our algorithm can still determine the state of a node with the accuracy above 0.9.
3D medical image segmentation has progressed considerably due to Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs), yet these methods struggle to balance long-range dependency acquisition with comput...
详细信息
ISBN:
(数字)9798331520526
ISBN:
(纸本)9798331520533
3D medical image segmentation has progressed considerably due to Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs), yet these methods struggle to balance long-range dependency acquisition with computational efficiency. To address this challenge, we propose UNETVL (U-Net Vision-LSTM), a novel architecture that leverages recent advancements in temporal information processing. UNETVL incorporates Vision-LSTM (ViL) for improved scalability and memory functions, alongside an efficient Chebyshev Kolmogorov-Arnold Networks (KAN) to handle complex and long-range dependency patterns more effectively. We validated our method on the ACDC and AMOS2022 (post challenge Task 2) benchmark datasets, showing a significant improvement in mean Dice score compared to recent state-of-the-art approaches, especially over its predecessor, UNETR, with increases of 7.3% on ACDC and 15.6% on AMOS, respectively. Extensive ablation studies were conducted to demonstrate the impact of each component in UNETVL, providing a comprehensive understanding of its architecture. Our code is available at https://***/tgrex6/UNETVL, facilitating further research and applications in this domain.
False Base Stations (FBSs) are nowadays proven to be a serious threat to location privacy. Apart from the location privacy threats, FBS causes several threats like Manin-the-Middle (MitM) attacks, eavesdropping, ident...
详细信息
ISBN:
(数字)9798331531195
ISBN:
(纸本)9798331531201
False Base Stations (FBSs) are nowadays proven to be a serious threat to location privacy. Apart from the location privacy threats, FBS causes several threats like Manin-the-Middle (MitM) attacks, eavesdropping, identity tracking, phishing attacks, etc. FBS-based two threats are presented in the 3GPP TR 33.809, namely, Authentication Relay Attack (ARA) and MitM attack. The corresponding solution mentioned for the ARA (which occurs because the user is connected with FBS) in TR 33.809 uses the real location of the user causing the location privacy issue. i.e., the user has to share its GPS location with the legitimate base station, even though it was not connected with the legitimate base station. In this regard, this work proposed an Elliptic Curve Cryptography (ECC) based proximity testing protocol termed as ECC based Private Equality Testing (EPET) to preserve the location privacy of the user under FBS.
This research introduces an innovative method for the real-time identification of bacterial blight in rice crops via remote sensing and deep learning (DL) technologies. Bacterial blight represents a significant threat...
详细信息
ISBN:
(数字)9798331509675
ISBN:
(纸本)9798331509682
This research introduces an innovative method for the real-time identification of bacterial blight in rice crops via remote sensing and deep learning (DL) technologies. Bacterial blight represents a significant threat to rice production, requiring quick detection for efficient control. To address this challenge, remote sensing data from drones and satellites is analyzed to detect visual signs connected to the diseases. A convolutional neural network (CNN) model is used to classify and identify sick rice plants using high-resolution images. The results demonstrate that the model attained an accurate rate of 98.2%, significantly enhancing the speed and precision of illness identification relative to conventional approaches. The combination of advanced DL algorithms with remote sensing technologies enables quick responses and improves sustainable agriculture practices. It illustrates the capability of using technology for crop monitoring, enhancing food security, and optimizing resource management in agriculture.
暂无评论