The use of lEC 61850 in electrical substation automation systems may have an impact on increasing the effectiveness and interoperability of smart grids. On the other hand, the development of connectivity will give ris...
详细信息
作者:
Warbhe, Mohan K.Bore, Joy JordanChaudari, Shiv Nath
Faculty of Engineering and Technology Department of Computer Science and Design Maharashtra Sawangi Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Medical Engineering MaharashtraSawangi Wardha442001 India
The proposed web application for tomato leaf disease detection exemplifies the transformative power of Artificial Intelligence and computer Vision in modern agriculture. Addressing the critical issue of early and accu...
详细信息
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high d...
详细信息
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data *** consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations(SBSs)are deployed in the areas with high User Equipment(UE)*** user centric deployment of mmWave SBSs inevitably incurs correlation between UE and *** a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave *** using tools from stochastic geometry,we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power *** UE clustering we considered Thomas cluster process and derive expressions for the association probability,coverage probability,area spectral efficiency,and energy *** also provide Monte Carlo simulation results to validate the accuracy of the derived ***,we analyze the impact of mmWave operating frequency,antenna gain,small cell biasing,and BSs density to get useful engineering insights into the performance of hybrid mmWave *** results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.
Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decisi...
详细信息
Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decision-making process. The autonomous connected vehicles on the road send significant data about their movements to the server to maintain continuous training. With the Proof of Authority (PoA) consensus process, blockchain technology provides a valid, decentralised and secure option to improve transactions throughput and minimise delay. The limited computational capacity of vehicles poses a challenge in achieving high accuracy and low latency while training self-driving algorithms. GPT-4V surpassed challenging autonomous systems in scene interpretation and causal thinking. GPT-4V has ability to navigate circumstances without access to database, interpret intentions, and make sound decisions in real-world driving scenarios. The reward function and different driving conditions are organised to allow an optimal search to find the most efficient driving style while ensuring safety. The consequences of the Blockchain-enabled decision-making model (DMM) for Self-Driving Vehicles (SDV) primarily based on GPT-4V and Federated Reinforcement Learning (FRL) would, likely, upgrades in decision-making accuracy, operational performance, statistics integrity, and potentially enhanced learning skills in SDV. Integrating blockchain technology, superior language modelling GPT-4V and FRL may lead to multiplied safety, reliability, and decision-making ability in SDV. This study utilised the Simulation of Urban MObility (SUMO) simulator to assess the ability of SDV to maintain its desired speed consistently and securely in a highway setting using proposed DMM. This study indicates that the suggested DMM, utilising the driving state evaluation approach for SDV, can help these vehicles operate safely and effectively. The performance of the proposed model, such as CPU utilisation
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions i...
详细信息
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions in videostreams holds significant importance in computer vision research, as it aims to enhance exercise adherence, enableinstant recognition, advance fitness tracking technologies, and optimize fitness routines. However, existing actiondatasets often lack diversity and specificity for workout actions, hindering the development of accurate recognitionmodels. To address this gap, the Workout Action Video dataset (WAVd) has been introduced as a significantcontribution. WAVd comprises a diverse collection of labeled workout action videos, meticulously curated toencompass various exercises performed by numerous individuals in different settings. This research proposes aninnovative framework based on the Attention driven Residual Deep Convolutional-Gated Recurrent Unit (ResDCGRU)network for workout action recognition in video streams. Unlike image-based action recognition, videoscontain spatio-temporal information, making the task more complex and challenging. While substantial progresshas been made in this area, challenges persist in detecting subtle and complex actions, handling occlusions,and managing the computational demands of deep learning approaches. The proposed ResDC-GRU Attentionmodel demonstrated exceptional classification performance with 95.81% accuracy in classifying workout actionvideos and also outperformed various state-of-the-art models. The method also yielded 81.6%, 97.2%, 95.6%, and93.2% accuracy on established benchmark datasets, namely HMDB51, Youtube Actions, UCF50, and UCF101,respectively, showcasing its superiority and robustness in action recognition. The findings suggest practicalimplications in real-world scenarios where precise video action recognition is paramount, addressing the persistingchallenges in the field. TheWAVd datas
Artificial Intelligence (AI) and Big Data Analytics are greatly transforming the healthcare scenario by facilitating the early detection of diseases, personalized medicine, and improved public health interventions. AI...
详细信息
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method ...
详细信息
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method for the right treatment for dermoscopic clinical features such as lesion borders,pigment networks,and the color of *** challenges are required an automated system to classify the clinical features of melanoma and non-melanoma *** trained clinicians can overcome the issues such as low contrast,lesions varying in size,color,and the existence of several objects like hair,reflections,air bubbles,and oils on almost all *** contour is one of the suitable methods with some drawbacks for the segmentation of irre-gular *** entropy and morphology-based automated mask selection is pro-posed for the active contour *** proposed method can improve the overall segmentation along with the boundary of melanoma *** this study,features have been extracted to perform the classification on different texture scales like Gray level co-occurrence matrix(GLCM)and Local binary pattern(LBP).When four different moments pull out in six different color spaces like HSV,Lin RGB,YIQ,YCbCr,XYZ,and CIE L*a*b then global information from different colors channels have been ***,hybrid fused texture features;such as local,color feature as global,shape features,and Artificial neural network(ANN)as classifiers have been proposed for the categorization of the malignant and *** had been carried out on datasets Dermis,DermQuest,and *** results of our advanced method showed super-iority and contrast with the existing state-of-the-art techniques.
Class imbalance is a significant and emerging issue in machine learning, which expresses that the number of majority class instances is much greater than the number of minority class instances. In real applications, a...
详细信息
Image captioning is an emerging field in machine *** refers to the ability to automatically generate a syntactically and semantically meaningful sentence that describes the content of an *** captioning requires a comp...
详细信息
Image captioning is an emerging field in machine *** refers to the ability to automatically generate a syntactically and semantically meaningful sentence that describes the content of an *** captioning requires a complex machine learning process as it involves two sub models:a vision sub-model for extracting object features and a language sub-model that use the extracted features to generate meaningful ***-based vision transformers models have a great impact in vision field *** this paper,we studied the effect of using the vision transformers on the image captioning process by evaluating the use of four different vision transformer models for the vision sub-models of the image captioning The first vision transformers used is DINO(self-distillation with no labels).The second is PVT(Pyramid Vision Transformer)which is a vision transformer that is not using convolutional *** third is XCIT(cross-Covariance Image Transformer)which changes the operation in self-attention by focusing on feature dimension instead of token *** last one is SWIN(Shifted windows),it is a vision transformer which,unlike the other transformers,uses shifted-window in splitting the *** a deeper evaluation,the four mentioned vision transformers have been tested with their different versions and different configuration,we evaluate the use of DINO model with five different backbones,PVT with two versions:PVT_v1and PVT_v2,one model of XCIT,SWIN *** results show the high effectiveness of using SWIN-transformer within the proposed image captioning model with regard to the other models.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论