Shoplifting presents a significant challenge for retailers, leading to substantial financial losses and security concerns. Current surveillance systems effectively identify shoplifting incidents postoccurrence; howeve...
详细信息
ISBN:
(数字)9798350377903
ISBN:
(纸本)9798350377910
Shoplifting presents a significant challenge for retailers, leading to substantial financial losses and security concerns. Current surveillance systems effectively identify shoplifting incidents postoccurrence; however, the capability to detect and prevent such activities preemptively remains limited. This research focuses on identifying behaviors that likely precede shoplifting events. To this end, we introduce a novel benchmark dataset, specifically designed for the early detection of suspicious behavior that may lead to shoplifting. This dataset is curated by selecting and segmenting relevant sequences from the UCF101-Crime dataset, encompassing suspicious behavior, actual shoplifting incidents, and normal activities. Our approach addresses the limitations of existing datasets where the brief duration of shoplifting events may skew neural network performance. The dataset includes clips of only a few seconds each, for which we propose a robust neural network architecture combining the strengths of convolutional neural networks (CNN) for efficient feature extraction and Bidirectional long short-term memory (BiLSTM) networks for capturing temporal dependencies within action sequences. Our model achieves an impressive classification accuracy of 86.21 % on the newly created dataset.
Copy-Move forgery detection (CMFD) is one of the most active study topics in blind image forensics. Most known algorithms are based on block and key-point approaches or a mix. Recently, various deep convolutional neur...
Copy-Move forgery detection (CMFD) is one of the most active study topics in blind image forensics. Most known algorithms are based on block and key-point approaches or a mix. Recently, various deep convolutional neural network approaches have been utilised in image classification, image forensics, image hashing retrieval, and other areas, and they have outperformed the previous way. The paper proposes a unique copy-move forgery detection system based on a convolutional neural network. The suggested technique takes a trained model from an extensive database such as ImageNet and minimally modifies the net structure using tiny training examples. The experimental findings indicate that the approach we presented outperforms the counterfeit picture created automatically by the computer using a simple image copy-move operation.
Team closeness provides the foundations of trust and communication, contributing to teams' success and viability. However, newcomers often struggle to be included in a team since incumbents tend to interact more w...
详细信息
Face recognition is a computer dynamic that determines the position and size of a human face in a digital image. This study suggests a system that will help you recognize students' faces, know entrance times, and ...
详细信息
Online retailers must monitor and respond to changing consumer trends to stay competitive. AI-driven customization's revolutionary impact on market trends is the focus of this study on online buying and customer b...
详细信息
ISBN:
(数字)9798331508456
ISBN:
(纸本)9798331508463
Online retailers must monitor and respond to changing consumer trends to stay competitive. AI-driven customization's revolutionary impact on market trends is the focus of this study on online buying and customer behavior. As AI advances, e-commerce platforms will be able to customize user experiences. Preprocessing, feature extraction, and model training comprise the AI-driven personalization process. Customer data from online marketplaces is collected first. It manages missing values, balance the data, encode categorical variables, scale the features, and minimize the dimensions as part of our thorough data preprocessing to ensure fair and applicable results. To trained the algorithms with CNN and Convolutional LSTM Based on key criteria, the AI model beat LSTM and CNN. It provides personalized insights and recommendations with an average accuracy of 92.03%. Personalized experiences and product suggestions enabled by AI-powered personalization have transformed e-commerce. It's important to use smart algorithms to engage customers and examine large databases. This proposed approach to shows that AI can transform online shopping and improve customer experiences.
Hydraulic systems in production equipment are relatively complex, involving various time series sensor data, such as operating sound frequencies and hydraulic pressure. However, fault prediction generally faces the bo...
Hydraulic systems in production equipment are relatively complex, involving various time series sensor data, such as operating sound frequencies and hydraulic pressure. However, fault prediction generally faces the bottleneck of insufficient fault data, leading to a severe imbalance between normal and fault data ratios. This imbalance makes it difficult for prediction models to effectively learn fault trends. In this paper, we propose a synthesis method for time series data to address this issue. The experimental results demonstrate that the synthesized data lead to significant improvements.
As artificial intelligence (AI) becomes increasingly integrated into everyday decision-making, so does the influence of large language models like ChatGPT. While AI systems generate moral judgments, there may be disti...
As artificial intelligence (AI) becomes increasingly integrated into everyday decision-making, so does the influence of large language models like ChatGPT. While AI systems generate moral judgments, there may be distinct differences between how humans and AI approach moral dilemmas. This study explores these differences by conducting a comparative analysis of moral decision-making narratives produced by human participants and AI, specifically ChatGPT-3. Key evaluation metrics included causality, explicability, and overall satisfaction. Participants were presented with a complex moral dilemma and asked to provide justifications for their decisions, which were then compared with AI-generated responses. Surprisingly, the study found no significant difference in the quality of the explanations produced by ChatGPT-3 and human respondents. In the second phase, we examined the role of verification methods in fostering trust in these explanations. Participants evaluated explanations verified by humans, AI, or left unverified and assigned trust scores accordingly. The results demonstrate that human verification significantly enhances trust in explanations, while AI verification, though beneficial, had a smaller impact. This study underscores the importance of distinguishing between moral and ethical reasoning in AI systems and highlights the role of verification in trust-building.
The interconnection and communication capabilities of many smart gadgets are made possible by the Internet of Things. Despite the practical advantages of the Internet of Things (IoT), it is susceptible to new forms of...
详细信息
ISBN:
(数字)9798350388916
ISBN:
(纸本)9798350388923
The interconnection and communication capabilities of many smart gadgets are made possible by the Internet of Things. Despite the practical advantages of the Internet of Things (IoT), it is susceptible to new forms of assaults due to the introduction of new technology. Intrusion detection systems (IDSs) need a lot of resources to determine the kind of assaults due to the complicated networks and vast amounts of data generated by the Internet of Things (IoT). In contrast, most intrusion detection methods are impractical for IoT networks due to the fact that these networks need greater computational resources for attack detection, which are in short supply on IoT devices. As a result, you need an intrusion detection system (IDS) that isn't too heavy yet can still detect emerging threats. In contrast, most intrusion detection methods are impractical for IoT networks due to the fact that these networks need greater computational capacity for attack detection, which are in short supply on IoT devices. As a result, you need an intrusion detection system (IDS) that isn't too heavy yet can still detect emerging threats. This study recommends a combination of Long Short-Term Memory (LSTM) and Random Forest to optimize detection performance while simultaneously reducing network complexity via the efficient elimination of unnecessary features. Applying hold-out, Stratified k-fold cross-validation, as well as percentage split test mode on the CICIDS-2017 dataset MachineLearning CSV version, the suggested IDS is verified with testing and training data. We opted for this dataset since it contains actual data from IoT networks. The suggested hybrid IDS shows promising experimental results for performance enhancement. Recall values average out to 1.000, resulting in an accuracy rating of 99.9%.
In comparison to Fermatean, Pythagorean, and intuitionistic fuzzy sets, (p,q)-rung orthopair fuzzy sets have a wider range of displaying membership grades and can therefore provide more uncertain situations. In this w...
详细信息
computer systems are vulnerable to information theft as a result of the extensive use of the internet, which has caused an increase in security defence mechanisms. In order to overcome these theft various approaches h...
computer systems are vulnerable to information theft as a result of the extensive use of the internet, which has caused an increase in security defence mechanisms. In order to overcome these theft various approaches have been proposed like Machine Learning, Swarm Intelligent Algorithm, Bayesian-based algorithms etc. For choosing effective and efficacious features and improve the Security Defense Mechanism. In order to lessen Distributed Denial of Service (DDO) assaults, we suggested a novel hybrid classification approach in this study based on Artificial Bee Colony (ABC) and Whale Optimisation Algorithm (WOA). The results are compared with other algorithms. These algorithms have shown promising results.
暂无评论