As crime rates rise at large events and possibly lonely places, security is always a top concern in every field. A wide range of issues may be solved with the use of computer vision, including anomalous detection and ...
As crime rates rise at large events and possibly lonely places, security is always a top concern in every field. A wide range of issues may be solved with the use of computer vision, including anomalous detection and monitoring. Intelligence monitoring is becoming more dependent on video surveillance systems that can recognise and analyse scene and anomaly occurrences. Using SSD and Faster RCNN techniques, this paper provides automated gun (or weapon) identification. Use of two different kinds of datasets is included in the proposed approach. As opposed to the first dataset, the second one comprises pictures that have been manually tagged. However, the trade-off between speed and precision in real-world situations determines whether or not each method will be useful.
Mobile PR is an important component of the mobile app ecosystem. A major threat to this ecosystem's long-term health is click fraud, which involves clicking on ads while infected with malware or using an automated...
Mobile PR is an important component of the mobile app ecosystem. A major threat to this ecosystem's long-term health is click fraud, which involves clicking on ads while infected with malware or using an automated bot to do it for you. The methods used to identify click fraud now focus on looking at server requests. Although these methods have the potential to produce huge numbers of false negatives, they may easily be avoided if clicks are hidden behind proxies or distributed globally. AdSherlock is a customer-side (inside the app) efficient and deployable click fraud detection system for mobile applications that we provide in this work. AdSherlock separates the computationally expensive click request identification procedures into an offline and online approach. AdSherlock uses URL (Uniform Resource Locator) tokenization in the Offline phase to create accurate and probabilistic patterns. These models are used to identify click requests online, and an ad request tree model is used to detect click fraud after that. In order to develop and evaluate the AdSherlock prototype, we utilise actual applications. It injects the online detector directly into an executable software package using binary instrumentation technology (BIT). The findings show that AdSherlock outperforms current state-of-the-art methods for detecting click fraud with little false positives. Advertisement requests identification, mobile advertising fraud detection are some of the keywords used in this article.
Aiming at the problems of single input mode and lack of naturalness in the assembly process of existing AR systems, a tracking registration method of mobile AR assembly system is proposed based on multi-quantity and m...
Aiming at the problems of single input mode and lack of naturalness in the assembly process of existing AR systems, a tracking registration method of mobile AR assembly system is proposed based on multi-quantity and multi-degree of freedom natural fingertip interaction. Firstly, the real-time and stable tracking of hand area in complex environment is realized based on the hand region tracking; secondly, the fingertip detection and recognition based on K-COS and parallel vector is used to improve the precision and stability of fingertip recognition; thirdly, the special movement track of fingertip is recognized based on improved DTW algorithm, which has strong compatibility and feature gradient transformation for complex fingertip trajectory recognition; finally, through the real-time transformation of projection relationship between fingertip and virtual object, the interaction between fingertip and virtual object is made more natural and realistic. The experimental results show that in the complex environment of background, illumination, scale and rotation, the precision of fingertip detection and recognition is about 93%, and the precision of fingertip motion template matching is about 91%. The translation error of the registration method based on visual feature recognition is reduced by about 100pix compared with fingertip tracking registration method, and the efficiency of mobile AR-guided assembly method is improved by about 24.77% compared with the traditional manual assisted assembly method. These data verifies the strong interaction and practicability of the fingertips based on the user's multi-quantity and multi-degree of freedom features in the process of mobile AR guided assembly.
作者:
Kusumalatha KarreY Rama DeviResearch Scholar
Department of Computer Science and Engineering Osmania University and Assistant Professor Department of Electronics and Computer Engineering Sreenidhi Institute of Science and Technology Hyderabad Professor
Department of Computer Science and Engineering Chaitanya Bharathi Institute of Technology Hyderabad
Autism is a mental condition which hinders social and communication skills. It's a lifelong disability which makes the child's day to day life very difficult. But in most of the cases early intervention has he...
Autism is a mental condition which hinders social and communication skills. It's a lifelong disability which makes the child's day to day life very difficult. But in most of the cases early intervention has helped the children to develop the skills which are needed to the fullest to overcome autism. As early the intervention, better the development of the child. Most of the research has been carried out to detect the autism using various machine learning algorithms which consider autistic diagnostic tools such as ADI-R, ADOS or CARS. Once autism is detected, different areas which need to be developed are considered and recommendations are given to the child. In this paper, a system is proposed which uses multi dimensional data collected from facp, DST and Diet to perform analytics using machine learning and provide recommendations to the child.
Recently, multi-wavelength narrow linewidth random fiber laser has very interested for every researcher in this field, because of their useful advantages application, such as high-resolution spectroscopy and fiber opt...
详细信息
ISBN:
(数字)9781728155586
ISBN:
(纸本)9781728155593
Recently, multi-wavelength narrow linewidth random fiber laser has very interested for every researcher in this field, because of their useful advantages application, such as high-resolution spectroscopy and fiber optic sensing. In this paper, the standard single-mode fiber is used to form a half-opened cavity structure for generating the narrow linewidth random fiber laser and used the FBG-FP as a filter to form the narrow linewidth RFL into multi-wavelength. Firstly, we used the Rayleigh scattering that processed as well as in a standard single-mode fiber to provide random distribution feedback at the same time while using erbium-doped fiber (EDF) to provide the gain or amplification for achieving a broadband random laser output. Then, FBG-FP is added to the half-open cavity random laser structure. The multi-wavelength and narrow linewidth RFL can be achieved when the broadband RFL goes through the FBG-FP. In this paper we have generated the multi-wavelength narrow linewidth random fiber laser which has more than 10 wavelengths and the 3dB bandwidth is less than 0.01 nm and the mode separation of each wavelength is 0.04nm.
Security is a key factor in today's fast communicating world. Many cryptographic algorithms are tested and put into use efficiently. Random numbers are used in diverse forms like nonces, secret key, initialization...
Security is a key factor in today's fast communicating world. Many cryptographic algorithms are tested and put into use efficiently. Random numbers are used in diverse forms like nonces, secret key, initialization vector, etc. They find place in encryption, digital signature, hashing algorithms. A deterministic algorithms takes an intial seed value as input and produces pseudo random numbers with falsely induced randomness. This research work extensively surveys large set of state-of-the-art PRNGs and categorizes them based on methodology used to produce them. We compared their statistical results obtained from various statistical test tools like NIST SP 800-22, TestU01. Finally, security analyses of various PRNGs were done quantitatively for their key space, key sensitivity, entropy, speed of bit generation, linear complexity. At last, we concluded the results with some future directions for researchers to carry out their research in improving the PRNGs.
Teachers may use advanced analytics to rapidly and correctly understand undergraduate behavior trends, especially when it comes to identifying undergraduate groupings that need to be focused on at a later time. This s...
Teachers may use advanced analytics to rapidly and correctly understand undergraduate behavior trends, especially when it comes to identifying undergraduate groupings that need to be focused on at a later time. This study uses data mining cluster analysis to analyze the constituent behavior of 3,245 undergraduates in a specific level 'B' institution's college network. According to the data, there are four different undergraduate groups with different Web access features, with 350 participants using the accomplishments and other variables of their success have an influence on these students. As a result of this research, we were able to collect data on undergraduate college network activity, which may be used to aid in the development of academic advising management.
As data processing advances, decentralized media has been widely recognized for its ability to store large amounts of data. By comparing a revisited content to a dispersed repository, a cloud provider may verify the d...
As data processing advances, decentralized media has been widely recognized for its ability to store large amounts of data. By comparing a revisited content to a dispersed repository, a cloud provider may verify the document's integrity without having to retrieve it. A reconsidered examining strategy is offered to lead the customer to reconsider the significant assessing task to third sector inspector, taking into consideration the important computing cost brought up by the checking process (TPA). TPA may be deterred by the primary revisited evaluating strategy, but the second plan gives the harmful organization the right of inspection over the readdressed data of users, which poses a significant risk to patient privacy. Human Emphasis for reconsidered inspection is presented in this work, which emphasizes that the service user can be overwhelmed by her own data. Based on user-centered design, our suggested methodology not only prevents patient's data from leaking to TPA without depending on cryptographic algorithms, but can also avoid the use of additional free unpredictable supply that is impossible to fulfill on a daily basis. Also, we start to make our approach work with continuous changes. Our recommended scheme is both verifiably safe and essentially productive, as shown by the privacy analysis and test evaluations.
Cars are the preferred vehicle for comfortable travel, especially on a long trip. Nowadays, peoples are trying to buy new cars, but the new tax policies increase the price amount by adding additional charges. So, most...
Cars are the preferred vehicle for comfortable travel, especially on a long trip. Nowadays, peoples are trying to buy new cars, but the new tax policies increase the price amount by adding additional charges. So, most of the people go for second-hand cars due to nominal price. Online portals also helped a lot, for buying and selling the used cars. Here, Machine learning algorithms play a vital role to predict the right price for the right car. In this paper, Multiple Linear Regression, KNN, Random Forest, Gradient Boosting and XGBoost models are developed and results are compared for accuracy. Among those XGBoost gives the highest r2 score, which is 88% of training data and 87% of test data. In the existing system, while pre-processing, all the null values are dropped and in categorical data conversion label encoder is used for numerical conversion but that is suitable for ordinal data. In the proposed system, two datasets are used to analyze the performance of imputation. For that, all the null values are imputed in one dataset and the results are compared with another non-imputed dataset. In categorical data conversion, one-hot encoding is used to represent the feature availability. And finally, results are analyzed the discussed the pros and cons of each technique.
作者:
N Satya SriveniK Hema LathaA Viji Amutha MaryMercy Paul SelvanUG Student
Department of Computer Science and Engineering Sathyabama Insititute of Science and Technology Chennai India Associate Professor
Department of Computer Science and Engineering Sathyabama Instititute of Science and Technology Chennai India Assistant Professor
Department of Computer Science and Engineering Sathyabama Insititute of Science and Technology Chennai India
Bone fracture is one of the most ordinary problems in mortals because of accidents or other causes. Breaking bones can occur in our body, such as the wrist, heel, ankle, hip, rib, leg, chest, etc. Fractures cannot be ...
Bone fracture is one of the most ordinary problems in mortals because of accidents or other causes. Breaking bones can occur in our body, such as the wrist, heel, ankle, hip, rib, leg, chest, etc. Fractures cannot be seen with the naked eye, so X-ray/CT images are used to detect them. But sometimes these images lack sufficient detail for diagnosis. Today image processing plays an important role in detecting bone fractures. Image processing is important for the archiving and transmission of modern data, in particular for image transmission, video encoding, digital libraries, image databases, and remote sensing. This research paper presents detailed research on image processing methods for detecting bone fractures. The following research will help in studying various techniques that can be used to detect fractures in boned through the process of image processing and also includes updating of some new techniques as an improvement.
暂无评论