Human-human interaction recognition is crucial in computer vision fields like surveillance,human-computer interaction,and social *** enhances systems’ability to interpret and respond to human behavior *** research fo...
详细信息
Human-human interaction recognition is crucial in computer vision fields like surveillance,human-computer interaction,and social *** enhances systems’ability to interpret and respond to human behavior *** research focuses on recognizing human interaction behaviors using a static image,which is challenging due to the complexity of diverse *** overall purpose of this study is to develop a robust and accurate system for human interaction *** research presents a novel image-based human interaction recognition method using a Hidden Markov Model(HMM).The technique employs hue,saturation,and intensity(HSI)color transformation to enhance colors in video frames,making them more vibrant and visually appealing,especially in low-contrast or washed-out *** filters reduce noise and smooth imperfections followed by silhouette extraction using a statistical *** extraction uses the features from Accelerated Segment Test(FAST),Oriented FAST,and Rotated BRIEF(ORB)*** application of Quadratic Discriminant Analysis(QDA)for feature fusion and discrimination enables high-dimensional data to be effectively analyzed,thus further enhancing the classification *** ensures that the final features loaded into the HMM classifier accurately represent the relevant human *** impressive accuracy rates of 93%and 94.6%achieved in the BIT-Interaction and UT-Interaction datasets respectively,highlight the success and reliability of the proposed *** proposed approach addresses challenges in various domains by focusing on frame improvement,silhouette and feature extraction,feature fusion,and HMM *** enhances data quality,accuracy,adaptability,reliability,and reduction of errors.
In the context of smart cities where green infras-tructure is incentived, besides important benefits like regulating temperatures and absorbing pollutants among others, tour by urban forests is a way to experience clo...
详细信息
Low-Rate Denial of Service (LDoS) attacks, an emerging breed of DoS attacks, present a formidable challenge in terms of their detectability. Within the realm of network security, these attacks cast a substantial shado...
详细信息
This paper investigates the classification of low probability of intercept (LPI) radar signals by exploiting the intrinsic advantages of the Vision Transformer (ViT). Due to the characteristics of LPI radar signals, s...
详细信息
IT/OT convergence in the form of a Cyber-Physical system (CPS) presents an opportunity to apply recent Information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber se...
详细信息
ISBN:
(数字)9798350395419
ISBN:
(纸本)9798350395426
IT/OT convergence in the form of a Cyber-Physical system (CPS) presents an opportunity to apply recent Information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber security threats for OT. The OT communication protocols, for example, have limited or no security capabilities for securing data exchange beyond basic authentication. The RNG (Random Number Generator) function is crucial in PLC for producing the encryption keys or the initial seed for security algorithms. The software-based PRNG (Pseudo RNG) is the most common approach for RNG in OT, instead of hardware-based RNG. This study provides a systematic literature review of the most recent evidence in digital transformation to secure data exchange in smart factories, within OT, or across OT and IT settings. It does this by looking at the PRNG on PLC and identifying the most recent trends and best practices. The findings include up-to-date data on author countries' distribution, published journals, research trends, industries, and industry types. The findings also address whether data flow is encrypted or shared in plaintext to ensure secure data transfer between IT and legacy OT environments. This paper concludes that while there is known RNG implementation in the actual embedded system in ICS, there is no evidence in the literature for using RNG in ICS networks for PLC implementation to secure data transfer with encryption.
Depressive Disorders (DD) is one of the most prevalent mental disorders in the world that may lead to suicide cases. To prevent the latter, ubiquitous early detection systems may be effective. Recent studies have sinc...
详细信息
Physical rehabilitation is crucial in healthcare, facilitating recovery from injuries or illnesses and improving overall health. However, a notable global challenge stems from the shortage of professional physiotherap...
详细信息
The purpose of this study is to find out what makes Generation Z students accept and use Canva as a tool for making presentation materials. The conceptual framework of this study is the combination of "Technology...
详细信息
Every patient has health record, it was written as statement of patient's conditions, treatments, and medications, and nowadays it is become digitalized, it can be copied and shared easily, but the nature of EHR i...
详细信息
Widyaiswara is required to show the best performance to fulfill his duties and obligations. Therefore, it is very important to measure the performance of the Widyaiswara, so that it can be used as evaluation material ...
详细信息
暂无评论