Accurate Human Activity Recognition (HAR) is a critical challenge with wide-ranging applications in healthcare, assistive technologies, and human-computer interaction. Traditional feature extraction methods often stru...
详细信息
Accurate Human Activity Recognition (HAR) is a critical challenge with wide-ranging applications in healthcare, assistive technologies, and human-computer interaction. Traditional feature extraction methods often struggle to capture the complex spatial and temporal dynamics of human movements, leading to suboptimal classification performance. To address this limitation, this study introduces a novel encoding approach using Locality-Constrained Linear Coding (LLC) to enhance the discriminative power of hand-crafted features extracted from low-cost wearable sensors—an accelerometer and a gyroscope. The proposed LLC-based encoding scheme enables robust feature representation, improving the accuracy of HAR models. The encoded features are classified using a diverse set of Machine Learning (ML) and Deep Learning (DL) algorithms, including Support Vector Machine (SVM), Logistic Regression (LR), Naive Bayes (NB), K-Nearest Neighbours (KNN), AdaBoost, Gradient Boosting Machine (GBM), and Deep Belief Network (DBN). Extensive quantitative evaluations demonstrate that LLC significantly outperforms conventional feature encoding techniques, leading to improved classification accuracy. Among the tested models, DBN achieves a state-of-the-art accuracy of 99%, highlighting its superiority for HAR tasks. The contributions of this research are threefold: (1) it establishes the necessity of an advanced encoding scheme (LLC) for feature enhancement in HAR, (2) it provides a rigorous comparative analysis of multiple ML and DL classifiers, and (3) it introduces a scalable and cost-effective HAR framework suitable for real-world applications. Performance is comprehensively assessed using robust evaluation metrics such as Area Under the Curve (AUC), Classification Accuracy (CA), F1 Score, Precision, Recall, and Matthews Correlation Coefficient (MCC). The findings of this study offer new insights into feature encoding for HAR, setting a foundation for future advancements in sensor-based act
In this paper, we propose an efficient code-based 1-out-of-N oblivious transfer, OT1N, based on McEliece assumptions without invoking the OT12 several times as in the paradigm proposed in [20,6]. We also show that the...
详细信息
In this paper, we propose an IND-CCA2 secure code based encryption scheme in the standard model, built on the Niederreiter encryption scheme. The security of the scheme is based on the hardness of the Syndrome Decodin...
详细信息
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes...
详细信息
ISBN:
(纸本)9789896740054
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes from one of the ring member, but does not know the actual sender. In this paper, we show attacks on ring signcryption schemes by Li et al. (Li et al., 2008b) and Chung et al. (Chung et al., 2006). We demonstrate anonymity and confidentiality attack on the scheme by Li et al. (Li et al., 2008b) and confidentiality attack on the scheme by Chung et al. (Chung et al., 2006).
Digital signature is the cryptographic primitive that ensures authentication and nonrepudiation. A password based blind signature can be used in the scenarios, where the participation of both the signer and the user a...
详细信息
Digital signature is the cryptographic primitive that ensures authentication and nonrepudiation. A password based blind signature can be used in the scenarios, where the participation of both the signer and the user are required. The user requires the authentication of the signer without revealing the message to the signer. This requirement is needed for real world applications such as client server applications in the banking scenario. As per our knowledge, the first password based blind short signature was constructed by Sangeetha et al. in CECC 2013 which ensures the properties unforgeability, blindness and unframeability. But if the password size is very small, it may be susceptible to off-line password guessing attack. In this paper we propose a strongly secure password based blind short signature which solves the off-line password guessing attack. The formal proof of the scheme is reduced to computational Diffie- Hellman(CDH) assumption.
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes...
详细信息
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes from one of the ring member, but does not know the actual sender. In this paper, we show attacks on ring signcryption schemes by Li et al. (Li et al., 2008b) and Chung et al. (Chung et al., 2006). We demonstrate anonymity and confidentiality attack on the scheme by Li et al. (Li et al., 2008b) and confidentiality attack on the scheme by Chung et al. (Chung et al., 2006).
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation...
详细信息
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation and integration of different vehicular and environmental aspects *** congestion is among the major issues in this regard which demands serious attention due to the rapid growth in the number of vehicles on the *** address this overwhelming problem,in this article,a cloudbased intelligent road traffic congestion prediction model is proposed that is empowered with a hybrid Neuro-Fuzzy *** aim of the study is to reduce the delay in the queues,the vehicles experience at different road junctions across the *** proposed model also intended to help the automated traffic control systems by minimizing the congestion particularly in a smart city environment where observational data is obtained from various implanted Internet of Things(IoT)sensors across the *** due preprocessing over the cloud server,the proposed approach makes use of this data by incorporating the neuro-fuzzy ***,it possesses a high level of accuracy by means of intelligent decision making with minimum error *** results reveal the accuracy of the proposed model as 98.72%during the validation phase in contrast to the highest accuracies achieved by state-of-the-art techniques in the literature such as 90.6%,95.84%,97.56%and 98.03%,*** far as the training phase analysis is concerned,the proposed scheme exhibits 99.214% accuracy. The proposed prediction modelis a potential contribution towards smart cities environment.
The National Health Interview Survey(NHIS)shows that there are 13.2%of children at the age of 11 to 17 who are suffering from Attention Deficit Hyperactivity Disorder(ADHD),*** treatment methods for ADHD are either ps...
详细信息
The National Health Interview Survey(NHIS)shows that there are 13.2%of children at the age of 11 to 17 who are suffering from Attention Deficit Hyperactivity Disorder(ADHD),*** treatment methods for ADHD are either psycho-stimulant medications or cognitive *** traditional methods,namely therapy,need a large number of visits to hospitals and include *** could be used for the effective treatment of *** could be a helpful tool in improving children and ADHD patients’cognitive skills by using Brain–computer Interfaces(BCI).BCI enables the user to interact with the computer through brain activity using Electroencephalography(EEG),which can be used to control different computer applications by processing acquired brain *** paper proposes a system based on neurofeedback that can improve cognitive skills such as attention level,mediation level,and spatial *** proposed system consists of a puzzle game where its complexity increases with each *** signals were acquired using the Neurosky headset;then sent the signals to the designed gaming *** neurofeedback system was tested on 10 different subjects,and their performance was calculated using different evaluation *** results show that this game improves player overall performance from 74%to 98%by playing each game level.
Recently a few Continuous Query systems have been developed to cope with applications involving continuous data *** the same time,numerous algorithms are proposed for better performance.A recent work on this subject w...
详细信息
Recently a few Continuous Query systems have been developed to cope with applications involving continuous data *** the same time,numerous algorithms are proposed for better performance.A recent work on this subject was to define scheduling strategies on shared window joins over data streams from multiple query *** these strategies,a tuple with the highest priority is selected to process from multiple ***,the performance of these static strategies is deeply influenced when data are bursting,because the priority is determined only by static information,such as the query windows,arriving order,*** this paper,we propose a novel adaptive strategy where the priority of a tuple is integrated with realtime information.A thorough experimental evaluation has demonstrated that this new strategy can outperform the existing strategies.
暂无评论