期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Automatic Detection and Characterization of Human Veins Using Infra-Red Image Processing
1
作者 Jean Ndoumbe Brice Ekobo Akoa +3 位作者 Gaelle Patricia Talotsing Frederic Franck Kounga Samuel Kaissassou Bertin Chouanmo Njo 《Journal of Computer and Communications》 2024年第9期141-159,共19页
The detection and characterization of human veins using infrared (IR) image processing have gained significant attention due to its potential applications in biometric identification, medical diagnostics, and vein-bas... The detection and characterization of human veins using infrared (IR) image processing have gained significant attention due to its potential applications in biometric identification, medical diagnostics, and vein-based authentication systems. This paper presents a low-cost approach for automatic detection and characterization of human veins from IR images. The proposed method uses image processing techniques including segmentation, feature extraction, and, pattern recognition algorithms. Initially, the IR images are preprocessed to enhance vein structures and reduce noise. Subsequently, a CLAHE algorithm is employed to extract vein regions based on their unique IR absorption properties. Features such as vein thickness, orientation, and branching patterns are extracted using mathematical morphology and directional filters. Finally, a classification framework is implemented to categorize veins and distinguish them from surrounding tissues or artifacts. A setup based on Raspberry Pi was used. Experimental results of IR images demonstrate the effectiveness and robustness of the proposed approach in accurately detecting and characterizing human. The developed system shows promising for integration into applications requiring reliable and secure identification based on vein patterns. Our work provides an effective and low-cost solution for nursing staff in low and middle-income countries to perform a safe and accurate venipuncture. 展开更多
关键词 Vein Detection Blood Radiation Infrared Image CLAHE Algorithm Raspberry Pi
在线阅读 下载PDF
Comparative Analysis of Machine Learning Models for PDF Malware Detection:Evaluating Different Training and Testing Criteria 被引量:3
2
作者 Bilal Khan Muhammad Arshad Sarwar Shah Khan 《Journal of Cyber Security》 2023年第1期1-11,共11页
The proliferation of maliciously coded documents as file transfers increase has led to a rise in sophisticated attacks.Portable Document Format(PDF)files have emerged as a major attack vector for malware due to their ... The proliferation of maliciously coded documents as file transfers increase has led to a rise in sophisticated attacks.Portable Document Format(PDF)files have emerged as a major attack vector for malware due to their adaptability and wide usage.Detecting malware in PDF files is challenging due to its ability to include various harmful elements such as embedded scripts,exploits,and malicious URLs.This paper presents a comparative analysis of machine learning(ML)techniques,including Naive Bayes(NB),K-Nearest Neighbor(KNN),Average One Dependency Estimator(A1DE),RandomForest(RF),and SupportVectorMachine(SVM)forPDFmalware detection.The study utilizes a dataset obtained from the Canadian Institute for Cyber-security and employs different testing criteria,namely percentage splitting and 10-fold cross-validation.The performance of the techniques is evaluated using F1-score,precision,recall,and accuracy measures.The results indicate that KNNoutperforms other models,achieving an accuracy of 99.8599%using 10-fold cross-validation.The findings highlight the effectiveness of ML models in accurately detecting PDF malware and provide insights for developing robust systems to protect against malicious activities. 展开更多
关键词 Cyber-security PDF malware model training testing
在线阅读 下载PDF
A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs
3
作者 Hina Gul Sana Ullah +1 位作者 Ki-Il Kim Farman Ali 《Computers, Materials & Continua》 SCIE EI 2024年第8期1831-1850,共20页
The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industria... The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industrial monitoring,transportation,and smart agriculture.Efficient and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of nodes.This paper presents a traffic-aware,cluster-based,and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such networks.The proposed protocol divides the network into clusters where optimal cluster heads are selected among super and normal nodes based on their residual energies.The protocol considers multi-criteria attributes,i.e.,energy,traffic load,and distance parameters to select the next hop for data delivery towards the base station.The performance of the proposed protocol is evaluated through the network simulator NS3.40.For different traffic rates,number of nodes,and different packet sizes,the proposed protocol outperformed LoRaWAN in terms of end-to-end packet delivery ratio,energy consumption,end-to-end delay,and network lifetime.For 100 nodes,the proposed protocol achieved a 13%improvement in packet delivery ratio,10 ms improvement in delay,and 10 mJ improvement in average energy consumption over LoRaWAN. 展开更多
关键词 Internet of Things wireless sensor networks traffic load CLUSTERING ROUTING energy efficiency
在线阅读 下载PDF
Investigation on Analog and Digital Modulations Recognition Using Machine Learning Algorithms
4
作者 Jean Ndoumbe Ivan Basile Kabeina +1 位作者 Gaelle Patricia Talotsing Soubiel-Noël Nkomo Biloo 《World Journal of Engineering and Technology》 2024年第4期867-884,共18页
In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to m... In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to machine learning techniques, the K-Nearest Neighbors (KNN) and Artificial Neural Networks (ANN). From a statistical and spectral analysis of signals, nine key differentiation features are extracted and used as input vectors for each trained model. The feature extraction is performed by using the Hilbert transform, the forward and inverse Fourier transforms. The experiments with the AMC Master dataset classify ten (10) types of analog and digital modulations. AM_DSB_FC, AM_DSB_SC, AM_USB, AM_LSB, FM, MPSK, 2PSK, MASK, 2ASK, MQAM are put forward in this article. For the simulation of the chosen model, signals are polluted by the Additive White Gaussian Noise (AWGN). The simulation results show that the best identification rate is the MLP neuronal method with 90.5% of accuracy after 10 dB signal-to-noise ratio value, with a shift of more than 15% from the k-nearest neighbors’ algorithm. 展开更多
关键词 Automatic Recognition Artificial Neural Networks K-Nearest Neighbors Machine Learning Analog Modulations Digital Modulations
在线阅读 下载PDF
A Hybrid Query-Based Extractive Text Summarization Based on K-Means and Latent Dirichlet Allocation Techniques
5
作者 Sohail Muhammad Muzammil Khan Sarwar Shah Khan 《Journal on Artificial Intelligence》 2024年第1期193-209,共17页
Retrieving information from evolving digital data collection using a user’s query is always essential and needs efficient retrieval mechanisms that help reduce the required time from such massive collections.Large-sc... Retrieving information from evolving digital data collection using a user’s query is always essential and needs efficient retrieval mechanisms that help reduce the required time from such massive collections.Large-scale time consumption is certain to scan and analyze to retrieve the most relevant textual data item from all the documents required a sophisticated technique for a query against the document collection.It is always challenging to retrieve a more accurate and fast retrieval from a large collection.Text summarization is a dominant research field in information retrieval and text processing to locate the most appropriate data object as single or multiple documents from the collection.Machine learning and knowledge-based techniques are the two query-based extractive text summarization techniques in Natural Language Processing(NLP)which can be used for precise retrieval and are considered to be the best option.NLP uses machine learning approaches for both supervised and unsupervised learning for calculating probabilistic features.The study aims to propose a hybrid approach for query-based extractive text summarization in the research study.Text-Rank Algorithm is used as a core algorithm for the flow of an implementation of the approach to gain the required goals.Query-based text summarization of multiple documents using a hybrid approach,combining the K-Means clustering technique with Latent Dirichlet Allocation(LDA)as topic modeling technique produces 0.288,0.631,and 0.328 for precision,recall,and F-score,respectively.The results show that the proposed hybrid approach performs better than the graph-based independent approach and the sentences and word frequency-based approach. 展开更多
关键词 Extractive text summarization machine learning natural language processing K-MEANS latent dirichlet allocation
在线阅读 下载PDF
Splicing Image and Its Localization:A Survey 被引量:2
6
作者 Jinwei Wang Yangyang Li 《Journal of Information Hiding and Privacy Protection》 2019年第2期77-86,共10页
With the rapid development of information technology,digital images have become an important medium for information transmission.However,manipulating images is becoming a common task with the powerful image editing to... With the rapid development of information technology,digital images have become an important medium for information transmission.However,manipulating images is becoming a common task with the powerful image editing tools and software,and people can tamper the images content without leaving any visible traces of splicing in order to gain personal goal.Images are easily spliced and distributed,and the situation will be a great threat to social security.The survey covers splicing image and its localization.The present status of splicing image localization approaches is discussed along with a recommendation for future research. 展开更多
关键词 Social security image splicing image splicing localization
在线阅读 下载PDF
Intelligent obstacle avoidance algorithm for safe urban monitoring with autonomous mobile drones 被引量:1
7
作者 Didar Yedilkhan Abzal E.Kyzyrkanov +2 位作者 Zarina A.Kutpanova Shadi Aljawarneh Sabyrzhan K.Atanov 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第4期19-36,共18页
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone swarms.The deployment of intelligent drone swarms offers promising solutions f... The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone swarms.The deployment of intelligent drone swarms offers promising solutions for enhancing the efficiency and scope of urban condition assessments.In this context,this paper introduces an innovative algorithm designed to navigate a swarm of drones through urban landscapes for monitoring tasks.The primary challenge addressed by the algorithm is coordinating drone movements from one location to another while circumventing obstacles,such as buildings.The algorithm incorporates three key components to optimize the obstacle detection,navigation,and energy efficiency within a drone swarm.First,the algorithm utilizes a method to calculate the position of a virtual leader,acting as a navigational beacon to influence the overall direction of the swarm.Second,the algorithm identifies observers within the swarm based on the current orientation.To further refine obstacle avoidance,the third component involves the calculation of angular velocity using fuzzy logic.This approach considers the proximity of detected obstacles through operational rangefinders and the target’s location,allowing for a nuanced and adaptable computation of angular velocity.The integration of fuzzy logic enables the drone swarm to adapt to diverse urban conditions dynamically,ensuring practical obstacle avoidance.The proposed algorithm demonstrates enhanced performance in the obstacle detection and navigation accuracy through comprehensive simulations.The results suggest that the intelligent obstacle avoidance algorithm holds promise for the safe and efficient deployment of autonomous mobile drones in urban monitoring applications. 展开更多
关键词 Drone swarms Fuzzy logic Intelligent solution Smart city Urban monitoring
在线阅读 下载PDF
Multimodal Deep Neural Networks for Digitized Document Classification
8
作者 Aigerim Baimakhanova Ainur Zhumadillayeva +4 位作者 Bigul Mukhametzhanova Natalya Glazyrina Rozamgul Niyazova Nurseit Zhunissov Aizhan Sambetbayeva 《Computer Systems Science & Engineering》 2024年第3期793-811,共19页
As digital technologies have advanced more rapidly,the number of paper documents recently converted into a digital format has exponentially increased.To respond to the urgent need to categorize the growing number of d... As digital technologies have advanced more rapidly,the number of paper documents recently converted into a digital format has exponentially increased.To respond to the urgent need to categorize the growing number of digitized documents,the classification of digitized documents in real time has been identified as the primary goal of our study.A paper classification is the first stage in automating document control and efficient knowledge discovery with no or little human involvement.Artificial intelligence methods such as Deep Learning are now combined with segmentation to study and interpret those traits,which were not conceivable ten years ago.Deep learning aids in comprehending input patterns so that object classes may be predicted.The segmentation process divides the input image into separate segments for a more thorough image study.This study proposes a deep learning-enabled framework for automated document classification,which can be implemented in higher education.To further this goal,a dataset was developed that includes seven categories:Diplomas,Personal documents,Journal of Accounting of higher education diplomas,Service letters,Orders,Production orders,and Student orders.Subsequently,a deep learning model based on Conv2D layers is proposed for the document classification process.In the final part of this research,the proposed model is evaluated and compared with other machine-learning techniques.The results demonstrate that the proposed deep learning model shows high results in document categorization overtaking the other machine learning models by reaching 94.84%,94.79%,94.62%,94.43%,94.07%in accuracy,precision,recall,F-score,and AUC-ROC,respectively.The achieved results prove that the proposed deep model is acceptable to use in practice as an assistant to an office worker. 展开更多
关键词 Document categorization deep learning machine learning CLASSIFICATION DIGITIZATION
在线阅读 下载PDF
Median Filtering Detection Based on Quaternion Convolutional Neural Network
9
作者 Jinwei Wang Qiye Ni +4 位作者 Yang Zhang Xiangyang Luo Yunqing Shi Jiangtao Zhai Sunil Kr Jha 《Computers, Materials & Continua》 SCIE EI 2020年第10期929-943,共15页
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image anti-forensics.Therefore,more attention has been paid to the forensics research of median filtering.In this paper,... Median filtering is a nonlinear signal processing technique and has an advantage in the field of image anti-forensics.Therefore,more attention has been paid to the forensics research of median filtering.In this paper,a median filtering forensics method based on quaternion convolutional neural network(QCNN)is proposed.The median filtering residuals(MFR)are used to preprocess the images.Then the output of MFR is expanded to four channels and used as the input of QCNN.In QCNN,quaternion convolution is designed that can better mix the information of different channels than traditional methods.The quaternion pooling layer is designed to evaluate the result of quaternion convolution.QCNN is proposed to features well combine the three-channel information of color image and fully extract forensics features.Experiments show that the proposed method has higher accuracy and shorter training time than the traditional convolutional neural network with the same convolution depth. 展开更多
关键词 Median filtering forensics quaternion convolution layer quaternion pooling layer color image
在线阅读 下载PDF
Enhanced Userspace and In-Kernel Trace Filtering for Production Systems
10
作者 Suchakrapani Datt Sharma Michel Dagenais 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第6期1161-1178,共18页
Trace tools like LTTng have a very low impact on the traced software as compared with traditional debuggers. However, for long runs, in resource constrained and high throughput environments, such as embedded network s... Trace tools like LTTng have a very low impact on the traced software as compared with traditional debuggers. However, for long runs, in resource constrained and high throughput environments, such as embedded network switching nodes and production servers, the collective tracing impact on the target software adds up considerably. The overhead is not just in terms of execution time but also in terms of the huge amount of data to be stored, processed and analyzed offiine. This paper presents a novel way of dealing with such huge trace data generation by introducing a Just-In-Time (JIT) filter based tracing system, for sieving through the flood of high frequency events, and recording only those that are relevant, when a specific condition is met. With a tiny filtering cost, the user can filter out most events and focus only on the events of interest. We show that in certain scenarios, the JIT compiled filters prove to be three times more effective than similar interpreted filters. We also show that with the increasing number of filter predicates and context variables, the benefits of JIT compilation increase with some JIT compiled filters being even three times faster than their interpreted counterparts. We further present a new architecture, using our filtering system, which can enable co-operative tracing between kernel and process tracing VMs (virtual machines) that share data efficiently. We demonstrate its use through a tracing scenario where the user can dynamically specify syscall latency through the userspace tracing VM whose effect is reflected in tracing decisions made by the kernel tracing VM. We compare the data access performance on our shared memory system and show an almost 100 times improvement over traditional data sharing for co-operative tracing. 展开更多
关键词 TRACING DEBUGGING FILTERING operating system INTERPRETER
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部