Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services *** this system,Platform as a Service(PaaS)offers a medium headed for a web development plat...
详细信息
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services *** this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and *** using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these *** though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite *** this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation *** can easily differentiate common traffic and attack *** only that,it greatly helps the network to distribute the resources only for authenticated *** effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks.
The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are al...
详细信息
Muscle–computer interfaces are devices that can identify the meaning of human bioelectrical signals, such as surface electromyography (sEMG) signals. sEMG signals can be obtained from arm-worn sensors and can be used...
详细信息
We proposed a novel image-enhancing framework to ensure consolidated restoration accuracy when remedying the visual quality of dehazed images, such as over-saturation, color deviation, or luminance issues. Conventiona...
详细信息
This research paper explores the application of computer Vision in the realm of classroom management by addressing the issue of cellphone usage during lectures among students. We present a method for cellphone detecti...
详细信息
Deep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utiliza...
详细信息
Deep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utilization of extensive datasets. Nevertheless, DL models have huge data requirements. Widening the learning capability of such models from limited samples even today remains a challenge, given the intrinsic constraints of small datasets. The trifecta of challenges, encompassing limited labeled datasets, privacy, poor generalization performance, and the costliness of annotations, further compounds the difficulty in achieving robust model performance. Overcoming the challenge of expanding the learning capabilities of Deep Learning models with limited sample sizes remains a pressing concern even today. To address this critical issue, our study conducts a meticulous examination of established methodologies, such as Data Augmentation and Transfer Learning, which offer promising solutions to data scarcity dilemmas. Data Augmentation, a powerful technique, amplifies the size of small datasets through a diverse array of strategies. These encompass geometric transformations, kernel filter manipulations, neural style transfer amalgamation, random erasing, Generative Adversarial Networks, augmentations in feature space, and adversarial and meta-learning training paradigms. Furthermore, Transfer Learning emerges as a crucial tool, leveraging pre-trained models to facilitate knowledge transfer between models or enabling the retraining of models on analogous datasets. Through our comprehensive investigation, we provide profound insights into how the synergistic application of these two techniques can significantly enhance the performance of classification tasks, effectively magnifying scarce datasets. This augmentation in data availability not only addresses the immediate challenges posed by limited datasets but also unlocks the full potential of working with Big Data in
This research explores significant advancements in semiconductor-based nanomaterials and their crucial applications in addressing environmental challenges. Highlighted for their expansive surface area, chemical stabil...
详细信息
Underwater image enhancement and object detection has great potential for studying underwater environments. It has been utilized in various domains, including image-based underwater monitoring and Autonomous Underwate...
详细信息
Underwater image enhancement and object detection has great potential for studying underwater environments. It has been utilized in various domains, including image-based underwater monitoring and Autonomous Underwater Vehicle (AUV)-driven applications such as underwater terrain surveying. It has been observed that underwater images are not clear due to several factors such as low light, the presence of small particles, different levels of refraction of light, etc. Extracting high-quality features from these images to detect objects is a significant challenging task. To mitigate this challenge, MIRNet and the modified version of YOLOv3 namely Underwater-YOLOv3 (U-YOLOv3) is proposed. The MIRNet is a deep learning-based technology for enhancing underwater images. while using YOLOv3 for underwater object detection it lacks in detection of very small objects and huge-size objects. To address this problem proper anchor box size, quality feature aggregation technique, and during object classification image resizing is required. The proposed U-YOLOv3 has three unique features that help to work with the above specified issue like accurate anchor box determination using the K-means++ clustering algorithm, introduced Spatial Pyramid Pooling (SPP) layer during feature extraction which helps in feature aggregation, and added downsampling and upsampling to improve the detection rate of very large and very small size objects. The size of the anchor box is crucial in detecting objects of different sizes, SPP helps in aggregation of features, while down and upsampling changes sizes of objects during object detection. Precision, recall, F1-score and mAP are used as assessment metrics to assess proposed work. The proposed work compared with SSD, Tiny-YOLO, YOLOv2, YOLOv3, YOLOv4, YOLOv5, KPE-YOLOv5, YOLOv7, YOLOv8 and YOLOv9 single stage object detectors. The experiment on the Brackish and Trash ICRA19 datasets shows that our proposed method enhances the mean average precision for b
This paper introduces a novel approach to Indian Sign Language Recognition (ISLR) by integrating Keras, Visual Transformers (ViT), and sophisticated data augmentation techniques. Our methodology emphasizes the develop...
详细信息
暂无评论