The manual analysis of job resumes poses specific challenges, including the time-intensive process and the high likelihood of human error, emphasizing the need for automation in content-based recommendations. Recent a...
详细信息
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s...
详细信息
Emotion recognition based on physiological signals has become a crucial area of research in affective computing and human-computer interaction, with applications in smart homes, workplaces, educational institutions, h...
详细信息
ISBN:
(纸本)9791188428137
Emotion recognition based on physiological signals has become a crucial area of research in affective computing and human-computer interaction, with applications in smart homes, workplaces, educational institutions, healthcare, and entertainment. In this study, a real-time emotion recognition system utilizing fog computing architecture was developed by considering the challenges of latency, total response time, resource usage, and security in IoT environments. The random forest machine learning model was trained with time-based statistical features by using the DREAMER dataset. Even though the model achieved an accuracy of 84.21% with 104 features, to meet real-time performance requirements, the system was optimized to calculate 24 features, maintaining a commendable accuracy of 79.70%. Extensive experiments demonstrated the superior performance of fog computing compared to edge and cloud computing in terms of latency, queuing delay, jitter, and most importantly total response time. The results highlight the proposed system's ability to support multiple users simultaneously. Copyright 2025 Global IT Research Institute (GIRI). All rights reserved.
Facial emotion recognition is one of the artificial intelligence implementations used to recognize emotions based on data learned by computers. Unlike humans, who can recognize a person's emotions directly, comput...
详细信息
The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and D...
详细信息
Seamless communication between authorities, people, and smart devices is crucial in today's globally interconnected world. Unprecedented demands on software design result from the advent of ubiquitous connectivity...
详细信息
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
Software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
With the modern city infrastructure and increasing number of subjects in the traffic environment, there is a need for increased number of parking places. As the parking place is usually not used for a whole day, it co...
详细信息
Data growth has led to the need to apply new ways to process data. Graph databases are increasing their use, which can be seen over the years, with the Neo4j system being the most common. The biggest problem is the sm...
详细信息
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and wide...
详细信息
暂无评论