Intelligent vehicle tracking and detection are crucial tasks in the realm of highway ***,vehicles come in a range of sizes,which is challenging to detect,affecting the traffic monitoring system’s overall *** learning...
详细信息
Intelligent vehicle tracking and detection are crucial tasks in the realm of highway ***,vehicles come in a range of sizes,which is challenging to detect,affecting the traffic monitoring system’s overall *** learning is considered to be an efficient method for object detection in vision-based *** this paper,we proposed a vision-based vehicle detection and tracking system based on a You Look Only Once version 5(YOLOv5)detector combined with a segmentation *** model consists of six *** the first step,all the extracted traffic sequence images are subjected to pre-processing to remove noise and enhance the contrast level of the *** pre-processed images are segmented by labelling each pixel to extract the uniform regions to aid the detection phase.A single-stage detector YOLOv5 is used to detect and locate vehicles in *** detection was exposed to Speeded Up Robust Feature(SURF)feature extraction to track multiple *** on this,a unique number is assigned to each vehicle to easily locate them in the succeeding image frames by extracting them using the feature-matching ***,we implemented a Kalman filter to track multiple *** the end,the vehicle path is estimated by using the centroid points of the rectangular bounding box predicted by the tracking *** experimental results and comparison reveal that our proposed vehicle detection and tracking system outperformed other state-of-the-art *** proposed implemented system provided 94.1%detection precision for Roundabout and 96.1%detection precision for Vehicle Aerial Imaging from Drone(VAID)datasets,respectively.
In recent years,the telecommunications sector is no longer limited to traditional communications,but has become the backbone for the use of data,content and digital applications by individuals,governments and companie...
详细信息
In recent years,the telecommunications sector is no longer limited to traditional communications,but has become the backbone for the use of data,content and digital applications by individuals,governments and companies to ensure the continuation of economic and social activity in light of social distancing and total closure inmost countries in the ***,electronic government(e-Government)andmobile government(m-Government)are the results of technological evolution and ***,it is important to investigate the factors that influence the intention to use m-Government services among Jordan’s *** paper proposed a new m-Government acceptance model in Jordan(AMGS);this model combines the information System(IS)Success Factor Model and Hofstede Cultural Dimensions *** study was conducted by surveying different groups of the Jordanian *** questionnaire was used to collect data from203 *** regression analysis has been conducted to analyze the *** results indicate that the significant predictors of citizen intention to use m-Government services in Jordan are information Quality,Service Quality,Uncertainty Avoidance,and Indulgence ***,the results also suggest that Power Distance is not a significant predictor of citizen intention to use m-Government services.
Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio...
详细信息
Graph clustering is a powerful technique used to identify and group similar nodes within a complex network structure. This procedure involves segmenting the graph into distinct groups, with the nodes in each group hav...
详细信息
The healthcare sector in Ukraine has long been in need of change, and many opportunities of blockchain technology can help it lead the transformation of this sector and ensure compliance with the requirements of the e...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
This paper overviews the Smart Home User Interfaces (UI) in the following aspects: general definition of Human-Machine Interface (HMI), types of common Smart Home UI, market analysis of HMI, voice assistants and chatb...
详细信息
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
详细信息
The active development of the Internet of Things (IoT) in recent years has increased people's need for control smart devices for home. At the same time, the complexity of these devices is growing. Therefore, Smart...
详细信息
This article examines the parameters of speech recognition in audio recordings containing a variety of phrases uttered by different people with different accents and intonations. The aim of the study is to evaluate th...
详细信息
暂无评论