This paper presents an analytical study and a technique for extracting the features of a common case of images of the iris called off-angle iris which was taken for persons identification systems. The main problem whe...
详细信息
ISBN:
(数字)9798350369106
ISBN:
(纸本)9798350369113
This paper presents an analytical study and a technique for extracting the features of a common case of images of the iris called off-angle iris which was taken for persons identification systems. The main problem when using biological iris measurements to identify the persons is the difficulty of identifying and extracting features of the iris. This problem is increasing when dealing with off-angle iris and it leads to decreased system accuracy and increased system rate error. In return, all the transfer learning techniques face difficulties in the case of heavily degraded data and partially occluded, and off-angle. A new method has a whole new methodology to deal with the image as it is without transformation processes. A new algorithm has been included for extracting features of the iris through the pupil switching points. The most discriminating points of the iris depend on the biological human eye statistics and analytical study. It has been trained and tested on the common images of the off-angle iris database so-called: “CASIA Iris 1.0”. It has been implemented in the MATLAB environment. The results showed the efficiency of this technique, high precision and more importantly low failed acceptance rate. It emphasized that it is adaptive as well as efficiency improvement of the system.
In this work, we applied 8 machine learning (ML) techniques to detect intrusions, namely, neural networks, kNN, SVM, random forest, trees, AdaBoost, naive Bayes, and stochastic gradient descent SGD. Using the NSL-KDD ...
In this work, we applied 8 machine learning (ML) techniques to detect intrusions, namely, neural networks, kNN, SVM, random forest, trees, AdaBoost, naive Bayes, and stochastic gradient descent SGD. Using the NSL-KDD data set, these ML techniques were trained and tested to correctly classify the network and operating system records of this dataset into one of 24 possible attacks. The performances of these ML methods were analyzed and compared, with the random forest method performing at the top. To the best of our knowledge, this is the first work on investigating more than 4 ML classifiers on this data set in one single work and using the same set of tools.
In today’s world Time-To-Market (TTM) plays a very important role in the success of any given chip. To reduce the TTM, many manufacturers rely on reusable IP cores. These reusable Intellectual Property(IP) cores may ...
In today’s world Time-To-Market (TTM) plays a very important role in the success of any given chip. To reduce the TTM, many manufacturers rely on reusable IP cores. These reusable Intellectual Property(IP) cores may come with a lot of unforeseen security issues related to reliability and verifiable point of origin. This paper presents a way of watermarking to reduce these security threats by embedding the designer’s watermark into an IP design at High Level Synthesis (HLS) stage. A boolean Satisfibility (SAT) based approach is proposed which has no additional area and performance overhead.
Physical objects with built-in sensors, processors, software, and other technologies that can communicate with one another and share data via the web are what the IoT refers to. Diverse devices that may cause security...
详细信息
The step-by-step method of constructing a short, easy-to-read, understandable, and contextual summary of an extensive text document is called text summarization. The principal role is to acquire the correct amount of ...
详细信息
ISBN:
(数字)9798331508432
ISBN:
(纸本)9798331508449
The step-by-step method of constructing a short, easy-to-read, understandable, and contextual summary of an extensive text document is called text summarization. The principal role is to acquire the correct amount of information within a period. Text reports are finished by humans, which requires experience in space and is also terribly tedious and time-consuming. Along with the advancement of technology, the amount of text data is difficult to understand and is not available in a structured manner due to the larger number of characters. Hence, this is a necessary tool for today. It has been divided into two subparts: text summarization with an abstractive approach, otherwise known as Abstractive Text Summarization (ATS), and the second, text summarization with an extractive approach, otherwise known as Extractive Text Summarization (ETS). In comparison to ATS, the second technique is significantly more manageable and efficient. ETS primarily operates by extracting essential tokens, and in some cases, entire sentences, from the input text document. Consequently, this approach autonomously generates a summary. This work has not only identified novel findings but also suggested cutting-edge techniques and approaches for future researchers in the field, offering valuable insights and practical support.
Cultural Tourism (CT) is a significant element of today’s economy, accounting for around 37% of the total tourist industry and expanding at a pace of over 15% each year. This function and economic impact can benefit ...
详细信息
ISBN:
(数字)9798350387537
ISBN:
(纸本)9798350387544
Cultural Tourism (CT) is a significant element of today’s economy, accounting for around 37% of the total tourist industry and expanding at a pace of over 15% each year. This function and economic impact can benefit some EU and non-EU locations and areas with high cultural, social, and environmental potential. Other synergistic variables such as know-how, Information Communication Technologies (ICTs), gastronomy, identity, local culture, values, intangible legacy, or other characteristics also contribute to this influence. The work presented in this paper is part of the Social Innovation and TEchnologies for Sustainable Growth through Participative Cultural TOURism (TExTOUR) project, which brings together partners from the quintuple social innovation helix (knowledge, business, society, government, and entrepreneurs) to co-design, validate, and scale up policies and strategies that have a positive impact on socioeconomic territorial development based on cultural tourism. TExTOUR collaborates with eight CT Pilots in lesser-known destinations to develop collaborative work methodologies for developing CT strategies for local sites, utilizing ICTs and social innovation tools. The CT-Labs assist stakeholders in putting CT ad hoc strategies and action plans into action, monitoring them, and validating them. As a result, a technological platform (ICT tool) is presented in this paper, with its components outlined.
With increase in number of vehicles, traffic congestion is on rise. It leads to a multitude of problems in urban areas. Commuters experience unpredictable travel times, resulting in delays, stress, and inefficiency. I...
With increase in number of vehicles, traffic congestion is on rise. It leads to a multitude of problems in urban areas. Commuters experience unpredictable travel times, resulting in delays, stress, and inefficiency. Inadequate planning and resource allocation hinder traffic management efforts, leading to congestion, increased accident risks, and reduced overall transportation system performance. A way to deal with these problems is predicting the flow of traffic and understanding patterns according to different urban areas. Existing research on traffic volume prediction has predominantly overlooked the influence of weather parameters, despite their potential impact. This paper fills this research gap by focusing on the integration of weather parameters into traffic volume prediction models and shedding light on the relationship among weather and traffic dynamics. The prediction algorithms employed in our study include Decision Trees, XGboost, Support Vector Machine and Random Forest are compared using prediction parameters including Mean Squared Error, Mean Absolute Error, Root Mean Squared Error, and R-square. After analyzing each Algorithm, the SVM algorithm arrives to be the best fit for predicting traffic volume on weather conditions.
The global COVID-19 pandemic led to a significant economic downturn, severely impacting financial systems and economies around the world. Widespread lockdowns and travel restrictions disrupted supply chains, forced bu...
详细信息
ISBN:
(数字)9798331529833
ISBN:
(纸本)9798331529840
The global COVID-19 pandemic led to a significant economic downturn, severely impacting financial systems and economies around the world. Widespread lockdowns and travel restrictions disrupted supply chains, forced business closures, and triggered job losses, highlighting the importance of sound financial planning. Term deposits have emerged as a preferred strategy for risk mitigation. In marketing, direct customer outreach has increasingly replaced traditional intermediary-based approaches. Using data from a Portuguese bank, this study explores the predictive accuracy of various machine learning models in identifying customers most likely to invest in term deposits. Machine learning techniques applied include Support Vector Machine (SVM), Gaussian Naïve Bayes, bagging, blending, Light Gradient Boosting Machine (GBM), bagging, and Extreme Gradient Boosting (XGBoost). Results demonstrate that bagging algorithms provide superior accuracy in predicting customer behavior, offering insights to enhance targeted marketing efforts."
This study investigates the potential of multimodal data integration, which combines electroencephalogram (EEG) data with sociodemographic characteristics like age, sex, education, and intelligence quotient (IQ), to d...
详细信息
This paper presents the development of an anthropomorphic robot designed for collaborative research alongside the Kuka LBR iiwa R820 robotic arm for the research project I-CATER. The primary objectives were designing ...
详细信息
ISBN:
(数字)9798350352344
ISBN:
(纸本)9798350352351
This paper presents the development of an anthropomorphic robot designed for collaborative research alongside the Kuka LBR iiwa R820 robotic arm for the research project I-CATER. The primary objectives were designing a robust and stable robot's structure, integrating hardware using the Robot Operating System (ROS), and developing a user- friendly Human-Machine Interface. Priority was set on ensuring the structure could support two robotic arms without compromising stability or functionality. Key components include 7 Degrees of Freedom (DoF) robotic arms, Rg2 grippers, a display and a 2 DoF neck for the vision system support, resembling the human head configuration. Considerations such as size, cost, fabrication techniques, and material availability were taken into account in the structure's design. Integration into a simplified interface allows for easy manipulation without advanced programming knowledge, facilitated by the middleware ROS for modularity and future upgrades. The outcome is RAMBO - a Robotic Anthropomorphic Manipulator for Bimanual Operations - which is a valuable research platform for natural human-robot collaboration.
暂无评论