This paper provides a thorough review of recommendation methods from academic literature, offering a taxonomy that classifies recommender systems (RSs) into categories like collaborative filtering, content-based syste...
详细信息
The IoT -based smart shopping cart system revolutionizes the retail experience by integrating RFID technology, image processing cameras, and weight sensors along with bill generation and payment checkout. RFID scanner...
详细信息
The Internet of Things (IoT) is a technique that allows our day-to-day life objects to interconnect from the Internet and receive and send information for a meaningful intention. Nowadays, IoT has resulted in various ...
详细信息
Sarcasm, widely used in social media and everyday conversations, presents a substantial challenge for natural language understanding. Enhancing the ability to accurately interpret sarcasm is crucial for advancing natu...
详细信息
Human-human interaction recognition is crucial in computer vision fields like surveillance,human-computer interaction,and social *** enhances systems’ability to interpret and respond to human behavior *** research fo...
详细信息
Human-human interaction recognition is crucial in computer vision fields like surveillance,human-computer interaction,and social *** enhances systems’ability to interpret and respond to human behavior *** research focuses on recognizing human interaction behaviors using a static image,which is challenging due to the complexity of diverse *** overall purpose of this study is to develop a robust and accurate system for human interaction *** research presents a novel image-based human interaction recognition method using a Hidden Markov Model(HMM).The technique employs hue,saturation,and intensity(HSI)color transformation to enhance colors in video frames,making them more vibrant and visually appealing,especially in low-contrast or washed-out *** filters reduce noise and smooth imperfections followed by silhouette extraction using a statistical *** extraction uses the features from Accelerated Segment Test(FAST),Oriented FAST,and Rotated BRIEF(ORB)*** application of Quadratic Discriminant Analysis(QDA)for feature fusion and discrimination enables high-dimensional data to be effectively analyzed,thus further enhancing the classification *** ensures that the final features loaded into the HMM classifier accurately represent the relevant human *** impressive accuracy rates of 93%and 94.6%achieved in the BIT-Interaction and UT-Interaction datasets respectively,highlight the success and reliability of the proposed *** proposed approach addresses challenges in various domains by focusing on frame improvement,silhouette and feature extraction,feature fusion,and HMM *** enhances data quality,accuracy,adaptability,reliability,and reduction of errors.
With the rise of globalization and the rapid advancements in technology, the volume of production has surged, making it easier to acquire counterfeit goods to an unprecedented degree. All types of industrial manufactu...
详细信息
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th...
详细信息
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is the best way to transmit data in a secure and reliable *** researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data *** algorithm has some data security *** some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original *** this paper,various data security techniques are developed,which can be used to protect the data from attackers ***,a customized American Standard Code for information Interchange(ASCII)table is *** value of each Index is defined in a customized ASCII *** an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the *** that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original *** the number of cipher values is double the original data,the attacker tries to decrypt each *** of getting the original data,the attacker gets such data that has no relation to the original *** that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain *** boundaries of each Hill text work up to that *** techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorit
Kubernetes, an open-source platform for automating deployment, scaling, and management of containerized applications, has become a cornerstone in modern IT infrastructure. Alongside its widespread adoption, Kubernetes...
详细信息
This survey article delves into the emerging and critical area of symbolic knowledge distillation in large language models (LLMs). As LLMs such as generative pretrained transformer-3 (GPT-3) and bidirectional encoder ...
详细信息
The world has witnessed various scientific disciplines’ rapid growth and advancement, leading to groundbreaking discoveries and advances in multiple fields in recent years. One such field that has gained significant ...
详细信息
暂无评论