Hand gesture recognition is a burgeoning area of study with wide-ranging applications, including human–computer interaction, sign language translation, and virtual reality control. In this work, we introduce an innov...
详细信息
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and s...
详细信息
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor...
详细信息
A major problem especially in urban areas is traffic congestion which causes increased travel times, pollution, and compromises safety. This paper presents the design of the Smart Traffic light timing Management Syste...
详细信息
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,*** Cloud Computing provides various advantages for u...
详细信息
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,*** Cloud Computing provides various advantages for users,it remains vulnerable to many types of attacks that attract cyber *** Denial of Service(DDoS)is the most common type of attack on cloud ***,Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS *** DDoS attacks have become increasingly widespread,it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish various types of DDoS ***,the monitoring pattern of traffic changes and accurate detection of DDoS attacks are most important and *** this research work,DDoS attack detection methods based on deep belief network feature extraction and Hybrid Long Short-Term Memory(LSTM)model have been proposed with NSL-KDD *** Hybrid LSTM method,the Particle Swarm Optimization(PSO)technique,which is combined to optimize the weights of the LSTM neural network,reduces the prediction *** deep belief network method is used to extract the features of IP packets,and it identifies DDoS attacks based on PSO-LSTM ***,it accurately predicts normal network traffic and detects anomalies resulting from DDoS *** proposed PSO-LSTM architecture outperforms the classification techniques including standard Support Vector Machine(SVM)and LSTM in terms of attack detection performance along with the results of the measurement of accuracy,recall,f-measure,precision.
Fungal infections at the skin of puppies, including dermatophytosis, are commonplace and pose great health dangers to each the animals and their proprietors. Although these infections do no longer affect human skin im...
详细信息
In the present optical fog/cloud computing environment, optical line terminals and optical network units are used as the most promising optical fog devices (OFDs). The inherent characteristics of fog computing provide...
详细信息
Every day,websites and personal archives create more and more *** size of these archives is *** comfort of use of these huge digital image gatherings donates to their ***,not all of these folders deliver relevant inde...
详细信息
Every day,websites and personal archives create more and more *** size of these archives is *** comfort of use of these huge digital image gatherings donates to their ***,not all of these folders deliver relevant indexing *** the outcomes,it is dif-ficult to discover data that the user can be absorbed ***,in order to determine the significance of the data,it is important to identify the contents in an informative *** annotation can be one of the greatest problematic domains in multimedia research and computer ***,in this paper,Adap-tive Convolutional Deep Learning Model(ACDLM)is developed for automatic image ***,the databases are collected from the open-source system which consists of some labelled images(for training phase)and some unlabeled images{Corel 5 K,MSRC v2}.After that,the images are sent to the pre-processing step such as colour space quantization and texture color class *** pre-processed images are sent to the segmentation approach for efficient labelling technique using J-image segmentation(JSEG).Thefinal step is an auto-matic annotation using ACDLM which is a combination of Convolutional Neural Network(CNN)and Honey Badger Algorithm(HBA).Based on the proposed classifier,the unlabeled images are *** proposed methodology is imple-mented in MATLAB and performance is evaluated by performance metrics such as accuracy,precision,recall and F1_*** the assistance of the pro-posed methodology,the unlabeled images are labelled.
The management of plastic waste in our ecosystem represents a significant environmental issue, necessitating effective sorting and categorization to facilitate efficient recycling practices. This study introduces a me...
详细信息
暂无评论