Deep neural networks (DNN) have reached impressive performance in computer vision, making them a natural choice for object detection problems in automated driving. However, DNNs used for object detection are known to ...
详细信息
In this article, a new coupled-inductors based three-level bipolar buck-boost ac-ac converter is proposed. The proposed converter can produce highly efficient and symmetric in-phase and antiphase buck and boost modes ...
详细信息
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human ...
详细信息
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human behavior is especially crucial in applications such as assessing security conditions and preventing crowd *** paper investigates the capability of deep neural network(DNN)algorithms to achieve our carefully engineered pipeline for crowd *** includes three principal stages that cover crowd analysis ***,individual’s detection is represented using the You Only Look Once(YOLO)model for human detection and Kalman filter for multiple human tracking;Second,the density map and crowd counting of a certain location are generated using bounding boxes from a human detector;and Finally,in order to classify normal or abnormal crowds,individual activities are identified with pose *** proposed system successfully achieves designing an effective collective representation of the crowd given the individuals in addition to introducing a significant change of crowd in terms of activities *** results onMOT20 and SDHA datasets demonstrate that the proposed system is robust and *** framework achieves an improved performance of recognition and detection peoplewith a mean average precision of 99.0%,a real-time speed of 0.6ms non-maximumsuppression(NMS)per image for the SDHAdataset,and 95.3%mean average precision for MOT20 with 1.5ms NMS per image.
A key goal of clustering is data reduction. In center-based clustering of complex objects therefore not only the number of clusters but also the complexity of the centers plays a crucial role. We propose LBudget Clust...
详细信息
1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increase...
详细信息
1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increases the system volume and *** study presents the development and testing of a robotic finger powered by electrohydrodynamic(EHD)*** leveraging the electric field-induced flow of dielectric fluids.
This study uses survey data and machine learning algorithms to forecast social media disorder in people. A total of 600 individuals answered questions on their social media usage patterns, internet habits, demographic...
详细信息
One of the challenges of treating lung tumors in radiation therapy is the patient's respiratory movements during the treatment, which lead to tumor motion. The goal of respiratory motion prediction is to predict t...
详细信息
Navigating the world with visual impairments presents unique challenges, often limiting independence and safety. This research introduces SafeStride, a novel algorithm designed to empower visually impaired individuals...
详细信息
This study investigates the effectiveness of haptic feedback in hand rehabilitation exercises, within both virtual reality (VR) and real-world settings, to enhance upper limb functionality in post-stroke recovery. We ...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to technological advancements. In addition, data owners often worry about misuse and unauthorized access to their personal information. To address this, we propose a secure data-sharing framework that uses local differential privacy (LDP) within a permissioned blockchain, enhanced by federated learning (FL) in a zero-trust environment. To further protect sensitive data shared by IoT devices, we use the Interplanetary File System (IPFS) and cryptographic hash functions to create unique digital fingerprints for files. We mainly evaluate our system based on latency, throughput, privacy accuracy, and transaction efficiency, comparing the performance to a benchmark model. The experimental results show that the proposed system outperforms its counterpart in terms of latency, throughput, and transaction efficiency. The proposed model achieved a lower average latency of 4.0 seconds compared to the benchmark model’s 5.3 seconds. In terms of throughput, the proposed model achieved a higher throughput of 10.53 TPS (transactions per second) compared to the benchmark model’s 8 TPS. Furthermore, the proposed system achieves 85% accuracy, whereas the counterpart achieves only 49%. IEEE
暂无评论