we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p...
详细信息
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** impl...
详细信息
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** implemented an Extended Kalman filter to create an activity recognition system *** proposed method applies an HSI color transformation in its initial stages to improve the clarity of the frame of the *** minimize noise,we use Gaussian *** of silhouette using the statistical *** use Binary Robust Invariant Scalable Keypoints(BRISK)and SIFT for feature *** next step is to perform feature discrimination using Gray *** that,the features are input into the Extended Kalman filter and classified into relevant human activities according to their definitive *** experimental procedure uses the SUB-Interaction and HMDB51 datasets to a 0.88%and 0.86%recognition rate.
The gaming industry produces vast amounts of user-generated feedback, making it challenging for developers to efficiently analyze and respond to real-time reviews. This study addresses the problem of classifying large...
详细信息
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure *** cryptography is a data encryption mechanism that consists of different steps and prevents the...
详细信息
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure *** cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the *** paper has developed an efficient algorithm to protect the data from invaders and secure the data from *** this algorithm is applied to the cloud network,the attacker will not be able to access the *** encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been *** that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this *** capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain *** data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been *** the end of the article,the latest technique will be compared with different *** will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis.
This study aims to investigate and propose solutions to traffic information extraction used for state estimation based on traffic data collected from crowd-source. Concretely, a framework to traffic data collection su...
详细信息
Wind power is one of the sustainable ways to generate renewable *** recent years,some countries have set renewables to meet future energy needs,with the primary goal of reducing emissions and promoting sustainable gro...
详细信息
Wind power is one of the sustainable ways to generate renewable *** recent years,some countries have set renewables to meet future energy needs,with the primary goal of reducing emissions and promoting sustainable growth,primarily the use of wind and solar *** achieve the prediction of wind power generation,several deep and machine learning models are constructed in this article as base *** regression models are Deep neural network(DNN),k-nearest neighbor(KNN)regressor,long short-term memory(LSTM),averaging model,random forest(RF)regressor,bagging regressor,and gradient boosting(GB)*** addition,data cleaning and data preprocessing were performed to the *** dataset used in this study includes 4 features and 50530 *** accurately predict the wind power values,we propose in this paper a new optimization technique based on stochastic fractal search and particle swarm optimization(SFSPSO)to optimize the parameters of LSTM *** evaluation criteria were utilized to estimate the efficiency of the regression models,namely,mean absolute error(MAE),Nash Sutcliffe Efficiency(NSE),mean square error(MSE),coefficient of determination(R2),root mean squared error(RMSE).The experimental results illustrated that the proposed optimization of LSTM using SFS-PSO model achieved the best results with R2 equals 99.99%in predicting the wind power values.
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by patient *** third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer *** ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and *** using all three approaches have not been examined till *** researchers found that Machine Learning(ML)techniques can improve ECG *** study will compare popular machine learning techniques to evaluate ECG *** algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization *** plus prior knowledge has the highest accuracy(99%)of the four ML *** characteristics failed to identify signals without chaos *** 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.
The advent of precision agriculture is disrupting traditional farming practices, leading to a significant increase in the data flow. However, current anomaly detection methods overlook the impact of concept drift. The...
详细信息
Dialect identification presents a challenging task within the realm of Natural Language Processing. The growing utilization of Arabic dialects in written form, particularly on social media platforms, has created new d...
详细信息
作者:
Magableh, Aws A.Yarmouk University
Faculty of Computer Science and Information Technology Department of Information Systems Irbid Jordan
The software development life cycle contains many phases, among the most notable ones is requirements engineering (RE), it is considered a very important activity because poorly implemented RE steps can result in poor...
详细信息
暂无评论