Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-ba...
详细信息
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-based rehabilitation. It is intended to observe the children's performance in terms of concentration, attention, and identification. The observation has been done through placards as a target image to display the 3D objects on a mobile phone or tablet. In this project, observations are made for 21 autism children in the age group of 7–14, out of whom 17 are boys and 5 are girls. Those 21 children are given practice identifying 15 different objects in an augmented reality environment. Their performance was initially evaluated using conventional instructional techniques. The majority of the kids were having more difficulty identifying things during that observation. Then, with an Augmented Reality environment, the identical observation has been made once more. Using a mobile device or tablet, the 3D objects from the provided placard photos are produced in an augmented reality environment with animation and voice in the languages of English and Tamil. Children with autism are able to recognize and also grasp the behaviors of those objects while viewing them in 3D. Their efforts are measured using a two-point scale (0, 1, 2). The pre-assessment and post-assessment reports for the above observations are tabulated. All the observations are made in the presence of the special education teacher (therapist). However, the children observed in this project fall into three different categories: mild, moderate, and severe. In the Mild category, statistical significance is evident with p values of 0.002 in pre-assessment and 0.014 in post-assessment. Likewise, in the Moderate category, where p values are 0.023 in pre-assessment and 0.033 in post-assessment, significance is observed, as all p values fall below the chosen significance level of 0.05. This leads to rejecti
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** add...
详细信息
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** addition,Cloud computing is incompatible with several industries,including finance and ***-key cryptography is frequently cited as a significant advancement in *** contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive *** study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key *** strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced *** the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure *** suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of *** on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data.
Video surveillance systems are often used for traffic monitoring and to characterize traffic load. However, most of the surveillance videos are low frame rated and extracting the right motion feature from them is a ch...
详细信息
The threat posed by credit card fraud, and by extension, online banking, continues to grow with the convenience brought forth by online banking services. Many financial institutions and customers stand at great risk b...
详细信息
Frauds don’t follow any recurring *** require the use of unsupervised learning since their behaviour is continually ***-sters have access to the most recent technology,which gives them the ability to defraud people t...
详细信息
Frauds don’t follow any recurring *** require the use of unsupervised learning since their behaviour is continually ***-sters have access to the most recent technology,which gives them the ability to defraud people through online *** make assumptions about consumers’routine behaviour,and fraud develops *** learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other *** a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization pat-terns with a focus on fraud situations that cannot be identified using historical data or supervised learning is the aim of this paper Artificial Bee Colony(ABC).Using real-time data and other datasets that are readily available,the ABC-Recurrent Neural Network(RNN)categorizes fraud behaviour and compares it to the current *** compared to the current approach,the findings demonstrate that the accuracy is high and the training error is minimal in ABC_*** this paper,we measure the Accuracy,F1 score,Mean Square Error(MSE)and Mean Absolute Error(MAE).Our system achieves 97%accuracy,92%precision rate and F1 score 97%.Also we compare the simulation results with existing methods.
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
Recommender systems aim to filter information effectively and recommend useful sources to match users' requirements. However, the exponential growth of information in recent social networks may cause low predictio...
详细信息
In today’s real world, an important research part in image processing isscene text detection and recognition. Scene text can be in different languages,fonts, sizes, colours, orientations and structures. Moreover, the...
详细信息
In today’s real world, an important research part in image processing isscene text detection and recognition. Scene text can be in different languages,fonts, sizes, colours, orientations and structures. Moreover, the aspect ratios andlayouts of a scene text may differ significantly. All these variations appear assignificant challenges for the detection and recognition algorithms that are consideredfor the text in natural scenes. In this paper, a new intelligent text detection andrecognition method for detectingthe text from natural scenes and forrecognizingthe text by applying the newly proposed Conditional Random Field-based fuzzyrules incorporated Convolutional Neural Network (CR-CNN) has been ***, we have recommended a new text detection method for detecting theexact text from the input natural scene images. For enhancing the presentation ofthe edge detection process, image pre-processing activities such as edge detectionand color modeling have beenapplied in this work. In addition, we have generatednew fuzzy rules for making effective decisions on the processes of text detectionand recognition. The experiments have been directedusing the standard benchmark datasets such as the ICDAR 2003, the ICDAR 2011, the ICDAR2005 and the SVT and have achieved better detection accuracy intext detectionand recognition. By using these three datasets, five different experiments havebeen conducted for evaluating the proposed model. And also, we have comparedthe proposed system with the other classifiers such as the SVM, the MLP and theCNN. In these comparisons, the proposed model has achieved better classificationaccuracywhen compared with the other existing works.
Tuberculosis (TB) is a serious health issue that kills a lot of people these days. TB is completely curable if it is discovered early enough. One way of diagnosing tuberculosis (TB) early on is to undergo a chest X-ra...
详细信息
暂无评论