A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the ord...
详细信息
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of *** work will present the implementation of sequence pattern mining for recommender systems within the domain of *** work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender *** feature selec-tion's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target *** will mitigate the feature vector's dimensionality by eliminating redundant,irrelevant,or noisy *** work pre-sents a new hybrid recommender system based on optimized feature selection and systolic *** features were extracted using Term Frequency-Inverse Docu-ment Frequency(TF-IDF),feature selection with the utilization of River Forma-tion Dynamics(RFD),and the Particle Swarm Optimization(PSO)*** systolic tree is used for pattern mining,and based on this,the recommendations are *** proposed methods were evaluated using the MovieLens dataset,and the experimental outcomes confirmed the efficiency of the *** was observed that the RFD feature selection with systolic tree frequent pattern mining with collaborativefiltering,the precision of 0.89 was achieved.
This paper focuses on the finite-time control(FTC) of the composite formation consensus(CFC)problems for multi-robot systems(MRSs). The CFC problems are firstly proposed for MRSs under the complex network topology of ...
详细信息
This paper focuses on the finite-time control(FTC) of the composite formation consensus(CFC)problems for multi-robot systems(MRSs). The CFC problems are firstly proposed for MRSs under the complex network topology of cooperative or cooperative-competitive networks. Regarding the problems of FTC and CFC on multiple Lagrange systems(MLSs), coupled sliding variables are introduced to deal with the robustness and consistent convergence. Then, the adaptive finite-time protocols are given based on the displacement approaches. With the premised FTC, tender-tracking methods are further developed for the problems of tracking information disparity. Stability analyses of those MLSs mentioned above are clarified with Lyapunov candidates considering the coupled sliding vectors, which provide new verification for tender-tracking systems. Under the given coupled-sliding-variable-based finite-time protocols, MLSs distributively adjust the local formation error to achieve global CFC and perform uniform convergence in time-varying tracking. Finally, simulation experiments are conducted while providing practical solutions for the theoretical results.
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that exist in it such as crimes,thefts,and so ***,the anomaly detection in pedestrian walkways has gained significant attention among the computer vision communities to enhance pedestrian *** recent advances of Deep Learning(DL)models have received considerable attention in different processes such as object detec-tion,image classification,*** this aspect,this article designs a new Panoptic Feature Pyramid Network based Anomaly Detection and Tracking(PFPN-ADT)model for pedestrian *** proposed model majorly aims to the recognition and classification of different anomalies present in the pedestrian walkway like vehicles,skaters,*** proposed model involves panoptic seg-mentation model,called Panoptic Feature Pyramid Network(PFPN)is employed for the object recognition *** object classification,Compact Bat Algo-rithm(CBA)with Stacked Auto Encoder(SAE)is applied for the classification of recognized *** ensuring the enhanced results better anomaly detection performance of the PFPN-ADT technique,a comparison study is made using Uni-versity of California San Diego(UCSD)Anomaly data and other benchmark data-sets(such as Cityscapes,ADE20K,COCO),and the outcomes are compared with the Mask Recurrent Convolutional Neural Network(RCNN)and Faster Convolu-tional Neural Network(CNN)*** simulation outcome demonstrated the enhanced performance of the PFPN-ADT technique over the other methods.
Vehicular Ad-Hoc Networks, also referred as VANETs, have emerged as an interesting area of research as a result of ever significant increase in the number of automobiles on roads. Built-in safety smart vehicular traff...
详细信息
In this paper, the superiority of Ge/Ge0.98Sn0.02asymmetrical supper lattice structure based vertically doped nano-scale pin photo-sensor under operating wavelength of 1200 nm to 2200 nm is reported. The aut...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
Cross-speed bearing fault diagnosis based on multiple source domains and their data enables high-performance condition monitoring for variable-speed equipment, such as engines and turbines. Current multi-source method...
详细信息
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
Wireless sensor network (WSN) applications are added day by day owing to numerous global uses (by the military, for monitoring the atmosphere, in disaster relief, and so on). Here, trust management is a main challenge...
详细信息
Background: Epilepsy is a neurological disorder that leads to seizures. This occurs due to excessive electrical discharge by the brain cells. An effective seizure prediction model can aid in improving the lifestyle of...
详细信息
暂无评论