In this paper, a new publicly available 1 web-Scraped Iranian Vehicle Dataset (SIVD) for simultaneous real-time vehicle tracking and recognition is proposed. The datasets provided for Iranian cars in the literature ...
详细信息
ISBN:
(纸本)9781665476249
In this paper, a new publicly available 1 web-Scraped Iranian Vehicle Dataset (SIVD) for simultaneous real-time vehicle tracking and recognition is proposed. The datasets provided for Iranian cars in the literature have two fundamental problems. First, the lack of images from different angles, and second, the small number of classes compared to the dispersion of car models in the real world. Therefore, for the purposes of this paper, Iranian vehicle images from car sales websites are collected, and the SIVD dataset is proposed which contains 29 classes and 36,705 images. This paper aims at developing a classification network for Iranian vehicle recognition and implement a real-time tracking system using the YOLOv5 network to perform real-time vehicle model recognition and tracking tasks simultaneously. The ResNet50 achieved an accuracy of 99.29%, the highest among the investigated classification networks. 1 https://***/Farbod-Siahkali/Iranian-Vehicle-Tracking-and-Recognition
Social media platforms played a significant role in spreading genocidal content in the 2020-2022 Tigray war, where the deadliest genocide of the 21st century was committed. While linguistic expertise is clearly needed...
详细信息
Accurately determining an individual's preference for images remains a major challenge in the field of emotional research. This study proposes a novel paradigm for identifying individual image preferences using el...
详细信息
Owing to the rapid evolution of technologies and project requirements, organizations need to upgrade the code base in their software projects to a new version of the programming language or even translating to an enti...
详细信息
While interest in blending sound with culinary experiences has grown in human-Food interaction (HFI), the significance of food's material properties in shaping sound-related interactions has largely been overlooke...
详细信息
This paper presents a lightweight algorithm for feature extraction, classification of seven different emotions, and facial expression recognition in a real-time manner based on static images of the human face. In this...
详细信息
Family technology use can create or amplify conflict in parents' relationships - we found four key factors that contribute to this issue. We conducted a probe and interview study with eight sets of parents, to exp...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
Recently, remote photoplethysmography (rPPG) has been studied and developed not only in a controlled environment but also in a wild environment such as telemedicine and driver monitoring. Although photoplethysmography...
详细信息
Deep Neural Networks (DNNs) have recently made significant strides in various fields;however, they are susceptible to adversarial examples-crafted inputs with imperceptible perturbations that can mislead these network...
详细信息
暂无评论