Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electro...
详细信息
The multi-modal object detection technology based on visible-thermal vision sensors has drawn significant attention as it is capable of achieving reliable object detection in complex scenes with challenging lighting c...
详细信息
Crowds can lead up to severe disasterous consequences resulting in fatalities. Videos obtained through public cameras or captured by drones flying overhead can be processed with artificial intelligence-based crowd ana...
详细信息
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between...
详细信息
Protecting the privacy of data in the multi-cloud is a crucial *** mining is a technique that protects the privacy of individual data while mining those *** most significant task entails obtaining data from numerous r...
详细信息
Protecting the privacy of data in the multi-cloud is a crucial *** mining is a technique that protects the privacy of individual data while mining those *** most significant task entails obtaining data from numerous remote *** algorithms can obtain sensitive information once the data is in the data *** traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud *** strategies are primarily concerned with protecting the privacy of user *** study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve *** approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing ***,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the *** approximation error,computational cost,anonymizing time,and data loss are considered performance *** suggested approach is practical and applicable in real-world situations according to the experimentalfindings.
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp...
详细信息
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions i...
详细信息
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions in videostreams holds significant importance in computer vision research, as it aims to enhance exercise adherence, enableinstant recognition, advance fitness tracking technologies, and optimize fitness routines. However, existing actiondatasets often lack diversity and specificity for workout actions, hindering the development of accurate recognitionmodels. To address this gap, the Workout Action Video dataset (WAVd) has been introduced as a significantcontribution. WAVd comprises a diverse collection of labeled workout action videos, meticulously curated toencompass various exercises performed by numerous individuals in different settings. This research proposes aninnovative framework based on the Attention driven Residual Deep Convolutional-Gated Recurrent Unit (ResDCGRU)network for workout action recognition in video streams. Unlike image-based action recognition, videoscontain spatio-temporal information, making the task more complex and challenging. While substantial progresshas been made in this area, challenges persist in detecting subtle and complex actions, handling occlusions,and managing the computational demands of deep learning approaches. The proposed ResDC-GRU Attentionmodel demonstrated exceptional classification performance with 95.81% accuracy in classifying workout actionvideos and also outperformed various state-of-the-art models. The method also yielded 81.6%, 97.2%, 95.6%, and93.2% accuracy on established benchmark datasets, namely HMDB51, Youtube Actions, UCF50, and UCF101,respectively, showcasing its superiority and robustness in action recognition. The findings suggest practicalimplications in real-world scenarios where precise video action recognition is paramount, addressing the persistingchallenges in the field. TheWAVd datas
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request ar...
详细信息
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request arrival *** classical intrusion detection system(IDS)is not a practical solution to the Industry 4.0 environment owing to the resource limitations and *** resolve these issues,this paper designs a new Chaotic Cuckoo Search Optimiza-tion Algorithm(CCSOA)with optimal wavelet kernel extreme learning machine(OWKELM)named CCSOA-OWKELM technique for IDS on the Industry 4.0 *** CCSOA-OWKELM technique focuses on the design of feature selection with classification approach to achieve minimum computation complex-ity and maximum detection *** CCSOA-OWKELM technique involves the design of CCSOA based feature selection technique,which incorpo-rates the concepts of chaotic maps with ***,the OWKELM technique is applied for the intrusion detection and classification *** addition,the OWKELM technique is derived by the hyperparameter tuning of the WKELM technique by the use of sunflower optimization(SFO)*** utilization of CCSOA for feature subset selection and SFO algorithm based hyperparameter tuning leads to better *** order to guarantee the supreme performance of the CCSOA-OWKELM technique,a wide range of experiments take place on two benchmark datasets and the experimental outcomes demonstrate the promis-ing performance of the CCSOA-OWKELM technique over the recent state of art techniques.
The rapid expansion of IoT technology has given rise to smart cities, but their complex architecture poses security challenges at various levels. This paper introduces a systematic literature review method to investig...
详细信息
Accurate cellular network traffic prediction is a crucial task to access Internet services for various devices at any *** the use of mobile devices,communication services generate numerous data for every *** the incre...
详细信息
Accurate cellular network traffic prediction is a crucial task to access Internet services for various devices at any *** the use of mobile devices,communication services generate numerous data for every *** the increasing dense population of data,traffic learning and prediction are the main components to substantially enhance the effectiveness of demand-aware resource allocation.A novel deep learning technique called radial kernelized LSTM-based connectionist Tversky multilayer deep structure learning(RKLSTM-CTMDSL)model is introduced for traffic prediction with superior accuracy and minimal time *** RKLSTM-CTMDSL model performs attribute selection and classification processes for cellular traffic *** this model,the connectionist Tversky multilayer deep structure learning includes multiple layers for traffic prediction.A large volume of spatial-temporal data are considered as an input-to-input ***,input data are transmitted to hidden layer 1,where a radial kernelized long short-term memory architecture is designed for the relevant attribute selection using activation function *** obtaining the relevant attributes,the selected attributes are given to the next *** index function is used in this layer to compute similarities among the training and testing traffic *** similarity index outcomes are given to the output *** value is used as basis to classify data as heavy network or normal ***,cellular network traffic prediction is presented with minimal error rate using the RKLSTM-CTMDSL *** evaluation proved that the RKLSTM-CTMDSL model outperforms conventional methods.
暂无评论