This paper provides an in-depth analysis of the application of the Quadratic Funding (QF) mechanism in blockchain-based Decentralized Autonomous Organizations (DAOs) of the QF mechanism. Then, the empirical analysis o...
详细信息
In dynamic optimization problems where optimal solutions change over time, traditional ant colony optimization (ACO) algorithms face limitations. This study explores the adaptation of multi-colony ACO algorithms, know...
详细信息
In this paper, we evaluate the noise sensitivity of mask based lensless imaging by analysing how much information is lost due to camera noise in low-light conditions. A noise model based on a lensless imaging system u...
详细信息
The sample’s hemoglobin and glucose levels can be determined by obtaining a blood sample from the human body using a needle and analyzing ***(HGB)is a critical component of the human body because it transports oxygen...
详细信息
The sample’s hemoglobin and glucose levels can be determined by obtaining a blood sample from the human body using a needle and analyzing ***(HGB)is a critical component of the human body because it transports oxygen from the lungs to the body’s tissues and returns carbon dioxide from the tissues to the *** the HGB level is a critical step in any blood analysis *** often indicate whether a person is anemic or polycythemia *** ensemble models by combining two or more base machine learning(ML)models can help create a more improved *** purpose of this work is to present a weighted average ensemble model for predicting hemoglobin *** optimization method is utilized to get the ensemble’s optimum *** optimum weight for this work is determined using a sine cosine algorithm based on stochastic fractal search(SCSFS).The proposed SCSFS ensemble is compared toDecision Tree,Multilayer perceptron(MLP),Support Vector Regression(SVR)and Random Forest Regressors as model-based approaches and the average ensemble *** SCSFS results indicate that the proposed model outperforms existing models and provides an almost accurate hemoglobin estimate.
Facial Attendance Tracker is a mobile application where a student can fetch his/her attendance by scanning his/her face from his/her own mobile. The faculty will project the Dynamic QR code when he/she wants to take t...
详细信息
ISBN:
(数字)9798350384277
ISBN:
(纸本)9798350384284
Facial Attendance Tracker is a mobile application where a student can fetch his/her attendance by scanning his/her face from his/her own mobile. The faculty will project the Dynamic QR code when he/she wants to take the attendance. The students have to login into the mobile application using the login credentials and scan the dynamic QR code provided by the faculty. Once, the QR code is scanned successfully, it will redirect to the camera where the student can fetch his/her face. The system comprises of acquiring the image, followed by sending the image to the database, detection of face, pre-processing, extraction of features, classifying the features and post- processing stage. To detect the face from the image, Viola-Jones algorithm has been used and Enhanced Mean Local Binary Pattern (EMLBP) algorithm is used to extract features as it outperforms the other algorithms in a huge margin.
Unmanned Aerial Vehicles (UAVs) are increasingly utilized across various domains, necessitating robust security measures for their communication networks. The ASCON family, a NIST finalist in lightweight cryptography ...
详细信息
Unmanned Aerial Vehicles (UAVs) are increasingly utilized across various domains, necessitating robust security measures for their communication networks. The ASCON family, a NIST finalist in lightweight cryptography standards, is known for its simplistic yet resilient design, making it well-suited for resource-constrained environments characterized by limited processing capabilities and energy reservoirs. This study focuses on understanding the integration and assessment of the ASCON encryption algorithm in UAV networks, emphasizing its potential as a lightweight and efficient cryptographic solution. The research objectives aim to evaluate ASCON variants' effectiveness in providing security comparable to AES-128 while exhibiting lower computational cost and energy consumption within simulated UAV network environments. Comparative analysis is conducted to assess performance metrics such as encryption and decryption speeds, resource utilization, and resistance to cryptographic vulnerabilities against established algorithms like AES. The proposed architecture outlines the setup for evaluating ASCON and AES in a simulated UAV network environment, focusing on performance monitoring, security analysis, and comparative studies. Performance metrics including peak and average execution times, overall throughput, and security properties against various cryptographic attacks are measured and analysed to determine the most suitable cryptographic algorithm for UAV communication systems. Performance results indicate that ASCON-128a as the optimal choice for UAV communication systems requiring a balance between efficiency and security. Its superior performance metrics, robust security properties, and suitability for resource-constrained environments position it as the preferred solution for securing UAV communication networks. By leveraging the strengths of ASCON-128a, UAV communication systems can achieve optimal performance and security, ensuring reliable and secure communicati
Statistical protocols are often used for decision-making involving multiple parties, each with their own incentives, private information, and ability to influence the distributional properties of the data. We study a ...
详细信息
The Fortran programming language is widely utilized in numerical computation and scientific computing. Fortran programs are prone to potential runtime errors related to numerical properties due to the large number of ...
详细信息
Current studies have shown that the spatial-temporal graph convolutional network(STGCN)is effective for skeleton-based action ***,for the existing STGCN-based methods,their temporal kernel size is usually fixed over a...
详细信息
Current studies have shown that the spatial-temporal graph convolutional network(STGCN)is effective for skeleton-based action ***,for the existing STGCN-based methods,their temporal kernel size is usually fixed over all layers,which makes them cannot fully exploit the temporal dependency between discontinuous frames and different sequence ***,most of these methods use average pooling to obtain global graph feature from vertex features,resulting in losing much fine-grained information for action *** address these issues,in this work,the authors propose a novel spatial attentive and temporal dilated graph convolutional network(SATD-GCN).It contains two important components,that is,a spatial attention pooling module(SAP)and a temporal dilated graph convolution module(TDGC).Specifically,the SAP module can select the human body joints which are beneficial for action recognition by a self-attention mechanism and alleviates the influence of data redundancy and *** TDGC module can effectively extract the temporal features at different time scales,which is useful to improve the temporal perception field and enhance the robustness of the model to different motion speed and sequence ***,both the SAP module and the TDGC module can be easily integrated into the ST-GCN-based models,and significantly improve their *** experiments on two large-scale benchmark datasets,that is,NTU-RGB+D and Kinetics-Skeleton,demonstrate that the authors’method achieves the state-of-the-art performance for skeleton-based action recognition.
In this paper,we propose a transmission scheme for uplink and downlink transmissions,where the fifth generation(5G)low-density parity-check(LDPC)codes are implemented for error *** the proposed scheme,the acknowledgme...
详细信息
In this paper,we propose a transmission scheme for uplink and downlink transmissions,where the fifth generation(5G)low-density parity-check(LDPC)codes are implemented for error *** the proposed scheme,the acknowledgment(ACK)or negative acknowledgment(NACK)feedback information is transmitted along with the payload data by cyclically shifting coded sequence,while the re-transmitted codewords are superimposed(XORed)partially on the current *** distinguished feature of the proposed transmission scheme is that it requires neither extra transmission bandwidth nor extra transmission *** also propose to truncate the error patterns for the purpose of reducing the implementation complexity and reducing the error *** results show that the proposed scheme significantly outperforms conventional LDPC-coded *** the 5G LDPC code with length 1920 at the signal-to-noise ratio(SNR)of 1.3 dB,the word error rate(WER)of the data transmitted by the proposed scheme is about 10^(−4),while that of the conventional LDPC-coded transmission is about 10^(−2).
暂无评论