The exchange of knowledge is widely recognized as a crucial aspect of effective knowledge management. When it comes to sharing knowledge within Prison settings, things get complicated due to various challenges such as...
详细信息
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer ...
详细信息
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer *** have paid a lot of attention to gait recognition,specifically the identification of people based on their walking patterns,due to its potential to correctly identify people far *** recognition systems have been used in a variety of applications,including security,medical examinations,identity management,and access *** systems require a complex combination of technical,operational,and definitional *** employment of gait recognition techniques and technologies has produced a number of beneficial and well-liked *** proposes a novel deep learning-based framework for human gait classification in video *** framework’smain challenge is improving the accuracy of accuracy gait classification under varying conditions,such as carrying a bag and changing *** proposed method’s first step is selecting two pre-trained deep learningmodels and training fromscratch using deep transfer ***,deepmodels have been trained using static hyperparameters;however,the learning rate is calculated using the particle swarmoptimization(PSO)***,the best features are selected from both trained models using the Harris Hawks controlled Sine-Cosine optimization *** algorithm chooses the best features,combined in a novel correlation-based fusion ***,the fused best features are categorized using medium,bi-layer,and tri-layered neural *** the publicly accessible dataset known as the CASIA-B dataset,the experimental process of the suggested technique was carried out,and an improved accuracy of 94.14% was *** achieved accuracy of the proposed method is improved by the recent state-of-the-art techniques that show the significance of this wor
Online learning, particularly Multi-Armed Bandit (MAB) algorithms, has been extensively adopted in various real-world networking applications. In certain applications, such as fair heterogeneous networks coexistence, ...
详细信息
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and ...
详细信息
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and acquire contextual information hinders their *** propose a Text Augmentation-based computational model for recognizing emotions using transformers(TA-MERT)to address *** proposed model uses the Multimodal Emotion Lines Dataset(MELD),which ensures a balanced representation for recognizing human *** used text augmentation techniques to producemore training data,improving the proposed model’s *** encoders train the deep neural network(DNN)model,especially Bidirectional Encoder(BE)representations that capture both forward and backward contextual *** integration improves the accuracy and robustness of the proposed ***,we present a method for balancing the training dataset by creating enhanced samples from the original *** balancing the dataset across all emotion categories,we can lessen the adverse effects of data imbalance on the accuracy of the proposed *** results on the MELD dataset show that TA-MERT outperforms earlier methods,achieving a weighted F1 score of 62.60%and an accuracy of 64.36%.Overall,the proposed TA-MERT model solves the GBN models’weaknesses in obtaining contextual data for ***-MERT model recognizes human emotions more accurately by employing text augmentation and transformer-based *** balanced dataset and the additional training samples also enhance its *** findings highlight the significance of transformer-based approaches for special emotion recognition in conversations.
The distributed data infrastructure in Internet of Things (IoT) ecosystems requires efficient data-series compression methods, as well as the capability to meet different accuracy demands. However, the compression per...
详细信息
Tourism route planning is widely applied in the smart tourism *** Pareto-optimal front obtained by the traditional multi-objective evolutionary algorithm exhibits long tails,sharp peaks and disconnected regions proble...
详细信息
Tourism route planning is widely applied in the smart tourism *** Pareto-optimal front obtained by the traditional multi-objective evolutionary algorithm exhibits long tails,sharp peaks and disconnected regions problems,which leads to uneven distribution and weak diversity of optimization solutions of tourism *** by these limitations,we propose a multi-objective evolutionary algorithm for tourism route recommendation(MOTRR)with two-stage and Pareto layering based on *** method decomposes the multiobjective problem into several subproblems,and improves the distribution of solutions through a two-stage *** crowding degree mechanism between extreme and intermediate populations is used in the two-stage *** neighborhood is determined according to the weight of the subproblem for crossover ***,Pareto layering is used to improve the updating efficiency and population diversity of the *** two-stage method is combined with the Pareto layering structure,which not only maintains the distribution and diversity of the algorithm,but also avoids the same *** with several classical benchmark algorithms,the experimental results demonstrate competitive advantages on five test functions,hypervolume(HV)and inverted generational distance(IGD)*** the experimental results of real scenic spot datasets from two famous tourism social networking sites with vast amounts of users and large-scale online comments in Beijing,our proposed algorithm shows better *** proves that the tourism routes recommended by our proposed algorithm have better distribution and diversity,so that the recommended routes can better meet the personalized needs of tourists.
Various methods have been proposed to secure access to sensitive information over time, such as many cryptographic methods in use to facilitate secure communications on the internet. But other methods like steganograp...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
The success of Internet of Things (IoT) services will be determined by how the security of the IoT devices and the networks to which they are connected can be guaranteed. Integrating biometric recognition technology i...
详细信息
A three-phase three-wire LCL grid-connected inverter is usually used as an interface between renewable-energy sources and grid. However, grid voltage is always distorted and results in grid-current distortion when the...
详细信息
暂无评论