Human action recognition and posture prediction aim to recognize and predict respectively the action and postures of persons in *** are both active research topics in computer vision community,which have attracted con...
详细信息
Human action recognition and posture prediction aim to recognize and predict respectively the action and postures of persons in *** are both active research topics in computer vision community,which have attracted considerable attention from academia and *** are also the precondition for intelligent interaction and human-computer cooperation,and they help the machine perceive the external *** the past decade,tremendous progress has been made in the field,especially after the emergence of deep learning ***,it is necessary to make a comprehensive review of recent *** this paper,firstly,we attempt to present the background,and then discuss research ***,we introduce datasets,various typical feature representation methods,and explore advanced human action recognition and posture prediction ***,facing the challenges in the field,this paper puts forward the research focus,and introduces the importance of action recognition and posture prediction by taking interactive cognition in self-driving vehicle as an example.
Big data applications are widely adopted to mine valuable information from a tremendous amount of industry data, which is commonly represented as a series of map-reduce operations. Among various map-reduce frameworks,...
详细信息
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cogniti...
详细信息
Spectrum resources are the precious and limited natural *** order to improve the utilization of spectrum resources and maximize the network throughput,this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonalmultiple access(CRN-NOMA).NOMA,as the key technology of the fifth-generation communication(5G),can effectively increase the capacity of 5G *** optimization problem proposed in this paper aims to maximize the number of secondary users(SUs)accessing the system and the total throughput in the *** the constraints of total power,minimum rate,interference and SINR,CRN-NOMA throughput is maximized by allocating optimal transmission ***,for the situation of multiple sub-users,an adaptive optimization method is proposed to reduce the complexity of the optimization ***,for the optimization problem of nonlinear programming,a maximization throughput optimization algorithm based on Chebyshev and convex(MTCC)for CRN-NOMA is proposed,which converts multi-objective optimization problem into single-objective optimization problem to *** the same time,the convergence and time complexity of the algorithm are *** analysis and simulation results show that the algorithm can effectively improve the system *** terms of interference and throughput,the performance of the sub-optimal solution is better than that of orthogonal-frequency-division-multiple-access(OFDMA).This paper provides important insights for the research and application of NOMA in future communications.
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
Thermooptic phase shifter (TOPS) plays an important role in the silicon photonics integrated circuits. In this article, we proposed and experimentally demonstrated a novel TOPS based on the anti-symmetric Bragg gratin...
详细信息
This study proposes an end-to-end method aimed at achieving intelligent colorization of images. This approach enables automatic colorization of grayscale images by taking in a grayscale image and a colored reference i...
详细信息
Machine learning models have been tested in the current research for detecting and classifying tomato diseases at their early stages. This is one of the core tasks of modern agriculture, being extremely beneficial in ...
详细信息
The basic goal of the IoT is to permit the online connection and communication of everyday physical objects like appliances, vehicles, and other gadgets. This paves the way for effortless and automated data collection...
详细信息
Quantization index modulation (QIM) based VoIP steganography can conceal secret information in VoIP streams. Malicious users could use this technology to conduct illegal activities, threatening network and public secu...
详细信息
暂无评论