Classifying and detecting difficult video events based on visual modalities remains an uncertain problem. Conventional video presentation approaches ineffectively extract each modality, hindering video event detection...
详细信息
ISBN:
(数字)9798350361780
ISBN:
(纸本)9798350361797
Classifying and detecting difficult video events based on visual modalities remains an uncertain problem. Conventional video presentation approaches ineffectively extract each modality, hindering video event detection (VED) rates. The research methodology involves pre-processing steps: uploading video data samples, extracting video frames, converting to grayscale (rgb2gray), enhancing, and calculating smooth frames from the UCF -101 dataset. This pre-processing phase aims to deliver high-quality frames without data loss. Next, the feature extraction process employs the HoG method to extract feature vectors from refined video frames, facilitating the training process and efficiently reducing dimensions. An adaptive, nature-inspired PBC method is then implemented to select reliable and optimized feature sets from the extracted ones. These selected optimized feature vectors are input into different events of the deep neural network (DNN) classifier. Finally, reliable feature sets are identified through feature matching, and experimental outcomes demonstrate a significant 21.3% enhancement in VED and classification, assessed through accuracy rate, specificity (SP), sensitivity (SN), etc. Compared with traditional approaches using manually designed feature sets, the proposed approach proves more effective. Simulation outcomes on publicly available VED databases consistently outperform state-of-the-art video representation methods such as EFS-linear multi-support vector machine (MSVM), convolutional neural network (CNN), etc.
This paper provides a comprehensive review of the application of online learning techniques in multi-UAV systems, highlighting their role in enhancing autonomy and efficiency in dynamic environments. Key areas of focu...
详细信息
ISBN:
(数字)9798350364637
ISBN:
(纸本)9798350364644
This paper provides a comprehensive review of the application of online learning techniques in multi-UAV systems, highlighting their role in enhancing autonomy and efficiency in dynamic environments. Key areas of focus include adaptive path planning, collision avoidance, and swarm behavior control, along with the associated technical challenges and future research directions.
The IEEE Std. 1687 (IJTAG) provides a more efficient and flexible mechanism to access embedded instruments in complex system-on-chips (SoC). Embedded instruments are mainly used for testing, debugging, diagnosing, and...
详细信息
Graph classification is a hot topic of machine learning for graph-structured data, and it is also a very potential and valuable research. However, the difficulty of graph classification is challenging and special, whi...
Graph classification is a hot topic of machine learning for graph-structured data, and it is also a very potential and valuable research. However, the difficulty of graph classification is challenging and special, which is quite different from the normal classification problems. One of the most difficult points of graph classification is that the numbers of vertex neighbors in graphs are usually variable, which makes the number of weights uncertain and ambiguous. Recent work such like the graph attention network apply the transformer on the graph neural network. However, the learned attentions cannot strictly reveal the importance of each part of graph, which makes the model less explainable. Moreover, for small datasets, it performs less effectively because of the excessive parameters. In order to overcome these difficulties, we propose a lightweight model with an edge weighting function based on the probability distributions of node pair features learned by the Gaussian mixture model. Although the proposed framework is simple, the experimental results shows its effectiveness on small datasets.
This work introduces a new loss function for modeling dielectric lifetime distributions with thickness nonuniformity. It is applicable to both maximum likelihood estimation and to a previously introduced machine learn...
详细信息
Cardiovascular diseases (CVD) are the leading cause of death globally and are estimated to affect 17. 9 million deaths annually. Early diagnosis is very important if one is to prevent adverse consequences. However, tr...
详细信息
ISBN:
(数字)9798331519056
ISBN:
(纸本)9798331519063
Cardiovascular diseases (CVD) are the leading cause of death globally and are estimated to affect 17. 9 million deaths annually. Early diagnosis is very important if one is to prevent adverse consequences. However, traditional diagnostic methods can take time to complete and miss subtle trends in patient information. This research presents an innovative approach utilizing a Recurrent Neural Network (RNN) model, optimized through Stochastic Gradient Descent (SGD), for the prediction of seven distinct types of heart disease: CAD, Heart Failure, AFib, Hypertensive Heart Disease, Congenital Heart Disease, Cardiomyopathy, and PAD. Their architecture is specifically suited for direct modeling of sequential patterns of the health related data that in turn helps to detect temporal patterns and changes in them. This model use ReLU activation function in their hidden layers, dropout in preventing overfitting and batch normalization for stable learning. Moreover, the feature augmentation is used in the model making it use various psychological and physiological parameters that help in making comprehensive predictions on the risks of heart disease. After training the RNN with a Kaggle dataset and properly tuning it, the model obtained an accuracy level of 91%, which means that is highly useful in identifying risk factors of cardiovascular diseases and could be used for early diagnosis and risk factors identification.
With the increasing number of actors in the under-water environment and the development of new applications, such as large-scale monitoring and autonomous underwater vehicle control, securing underwater communications...
详细信息
ISBN:
(数字)9798331540081
ISBN:
(纸本)9798331540098
With the increasing number of actors in the under-water environment and the development of new applications, such as large-scale monitoring and autonomous underwater vehicle control, securing underwater communications is becoming a primary necessity. Security was not prioritized in the past due to the constraints of underwater acoustic communications, which cannot sustain the overhead of typical cryptographic techniques. In this paper, we propose a method to authenticate a network device by exploiting the physical properties of the acoustic channel. In particular, our method hinges on the uniqueness and quasi-reciprocity of the channel, from which the authenticator (Alice) node can extract several parameters such as the number of multi path channel components, their delay and amplitude. These values are similar on both ends of a link between Alice and a legitimate transmitter (Bob), and can be used as a seed to craft a new artificial channel, that is then applied to transmissions from Bob to Alice. With this procedure, Alice can distinguish Bob from an impersonating attacker (Eve), given a previous message exchange history. Eve can try to bypass the protocol by estimating the channel parameters and by trying to replicate Bob's signal by crafting a similar channel. In our tests, we observe that the estimation error for Eve, caused by her wrong channel estimates, becomes significant even for short distances betwen Eve and Bob. This error results in a discrepancy between the signal generated by Eve and the one expected by Alice, and reveals Eve as an attacker.
Implemented conventional KYC methods in Bangladesh have several drawbacks such as data leakage, unproductiveness, and information opacity that affect the identity confirmation process of users across the organizations...
详细信息
ISBN:
(数字)9798331519094
ISBN:
(纸本)9798331519100
Implemented conventional KYC methods in Bangladesh have several drawbacks such as data leakage, unproductiveness, and information opacity that affect the identity confirmation process of users across the organizations. Blockchain technology provides an efficient and secure means of developing supply chain transparency. The research outlines the design of an e-KYC system using blockchain, with wallet sharing service provided through sharding and enhanced identity validation through machine learning. Some questions answered by the system include private key management, transaction, and gas fees for user sovereignty, security, and accurate data in transactions. All users benefit from ease in sharding of wallets, while machine learning ensures that the chances of fraud are minimized, and accuracy enhanced. Specifically, this approach improves security, transparency, and operation, which can dramatically transform the process of identity verification in the financial sector of Bangladesh making the system more reliable.
In an era marked by digital expansion, discriminatory speech remains a widespread concern, exerting significant societal implications. This study presents an overview of discriminatory speech detection techniques and ...
详细信息
ISBN:
(数字)9798350371314
ISBN:
(纸本)9798350371321
In an era marked by digital expansion, discriminatory speech remains a widespread concern, exerting significant societal implications. This study presents an overview of discriminatory speech detection techniques and explores the complexities involved in identifying discriminatory speech by utilizing a variety of datasets from various fields. The importance of preprocessing methods and feature engineering is next examined, opening the door for more in-dept. study. Furthermore, the paper delves into traditional Machine Learning (ML) algorithms and state-of-the-art Deep Learning (DL) models along with a crucial component of using graph-based structures with Natural Language Processing (NLP) techniques and the use of graphs to extract contextual information. Using both graphs and NLP algorithms enhances the identification process by uncovering contextual connections within textual data.
A Nobel approach to the password management system is introduced in this paper, which is through a decentralized system named blockchain. Our goal is to secure people’s passwords by providing them with a secure and d...
详细信息
ISBN:
(数字)9798350354348
ISBN:
(纸本)9798350354355
A Nobel approach to the password management system is introduced in this paper, which is through a decentralized system named blockchain. Our goal is to secure people’s passwords by providing them with a secure and distributed password management system named "PassChain." In today’s digital world, a secure password management system is crucial, but it is still challenging. The traditional system lacks security and is a centralized system, so trust issues also arise. Our proposed blockchain-based solution offers full control over users’ passwords. Because of the decentralized method, they are not stored on a single server. Decentralized servers are also more secure than databases. This approach will ensure user security and privacy and will also reduce dependency on third-party services that are prone to vulnerabilities.
暂无评论