Advanced Search
Displaying 1-10 on page 1 of 10907. Per Page  
  • A Hybrid Algorithm Based on PSO and GA for Feature Selection
  • Abstract One of the main problems of machine learning and data mining is to develop a basic model with a few features, to reduce the algorithms involved in classification’s computational complexity. In this paper, the collection of features has an essential importance in the classification process to be able minimize computational time, which decreases data size and increases the precision and effectiveness of specific machine learning activities. Due to its superiority to conventional optimization methods, several metaheuristics have been used to resolve FS issues. This is why hybrid metaheuristics help increase the search and convergence rate of the critical algorithms. A…
  • More
  •   Views:33       Downloads:25        Download PDF
  • Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT
  • Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an…
  • More
  •   Views:25       Downloads:16        Download PDF
  • Computational Intelligent Techniques To Detect DDOS Attacks : A Survey
  • Abstract The Internet is often targeted by the Distributed Denial of Service (DDOS) Attacks that deliberately utilize resources and bandwidth to prohibit access to potential users. The attack possibility is that the packets are filled massively. A DOS attack is launched by a single source, while a DDOS attack is originated from numerous resources. DDoS attacks are not capable of stealing website user’s information. The prime motive of the DDoS attacks is to devastate the website resources. Distributed Denial of Service (DDoS) attacks are disruptive to internet access on the Network. The attitude of the customer to get fast and reliable…
  • More
  •   Views:23       Downloads:17        Download PDF
  • Pedestrian Crossing Detection Based on HOG and SVM
  • Abstract In recent years, pedestrian detection is a hot research topic in the field of computer vision and artificial intelligence, it is widely used in the field of security and pedestrian analysis. However, due to a large amount of calculation in the traditional pedestrian detection technology, the speed of many systems for pedestrian recognition is very limited. But in some restricted areas, such as construction hazardous areas, real-time detection of pedestrians and cross-border behaviors is required. To more conveniently and efficiently detect whether there are pedestrians in the restricted area and cross-border behavior, this paper proposes a pedestrian cross-border detection method…
  • More
  •   Views:26       Downloads:14        Download PDF
  • Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano
  • Abstract In recent years, with the rapid development of the drone industry, drones have been widely used in many fields such as aerial photography, plant protection, performance, and monitoring. To effectively control the unauthorized flight of drones, using GPS spoofing attacks to interfere with the flight of drones is a relatively simple and highly feasible attack method. However, the current method uses ground equipment to carry out spoofing attacks. The attack range is limited and the flexibility is not high. Based on the existing methods, this paper proposes a multi-UAV coordinated GPS spoofing scheme based on YOLO Nano, which can launch…
  • More
  •   Views:25       Downloads:17        Download PDF
  • Provenance Method of Electronic Archives Based on Knowledge Graph in Big Data Environment
  • Abstract With the advent of the era of big data, the Provenance Method of electronic archives based on knowledge graph under the environment of big data has produced a large number of electronic archives due to the development of science and technology. How to guarantee the credential characteristics of electronic archives in the big data environment has attracted wide attention of the academic community. Provenance is an important technical means to guarantee the certification of electronic archives. In this paper, knowledge graph technology is used to provide the concept provenance of electronic archives in large data environment. It not only enriches…
  • More
  •   Views:91       Downloads:34        Download PDF
  • Adaptive Multi-Scale HyperNet with Bi-Direction Residual Attention Module for Scene Text Detection
  • Abstract Scene text detection is an important step in the scene text reading system. There are still two problems during the existing text detection methods: (1) The small receptive of the convolutional layer in text detection is not sufficiently sensitive to the target area in the image; (2) The deep receptive of the convolutional layer in text detection lose a lot of spatial feature information. Therefore, detecting scene text remains a challenging issue. In this work, we design an effective text detector named Adaptive Multi-Scale HyperNet (AMSHN) to improve texts detection performance. Specifically, AMSHN enhances the sensitivity of target semantics in…
  • More
  •   Views:85       Downloads:39        Download PDF
  • A Reversible Data Hiding Algorithm Based on Secret Sharing
  • Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the encrypted information using the watermark…
  • More
  •   Views:80       Downloads:37        Download PDF
  • The Design of Intelligent Wastebin Based on AT89S52
  • Abstract Mainly introduces intelligent classification trash can be dedicated to solving indoor household garbage classification. The trash can is based on AT89S52 single-chip microcomputer as the main control chip. The single-chip microcomputer realizes the intelligent classification of garbage by controlling the voice module, mechanical drive module, and infrared detection module. The use of voice control technology and infrared detection technology makes the trash can have voice control and overflow alarm functions. The design has the advantages of simple and intelligent operation, simple structure, stable performance, low investment, etc., which can further effectively isolate people and garbage, reduce human infection with bacteria,…
  • More
  •   Views:83       Downloads:31        Download PDF
  • Realization of Mobile Augmented Reality System Based on Image Recognition
  • Abstract With the development of computation technology, the augmented reality (AR) is widely applied in many fields as well as the image recognition. However, the AR application on mobile platform is not developed enough in the past decades due to the capability of the mobile processors. In recent years, the performance of mobile processors has changed rapidly, which makes it comparable to the desktop processors. This paper proposed and realized an AR system to be used on the Android mobile platform based on the image recognition through EasyAR engine and Unity 3D development tools. In this system, the image recognition could…
  • More
  •   Views:78       Downloads:30        Download PDF
Displaying 1-10 on page 1 of 10907. Per Page