首页 > 最新文献

International Journal of Engineering and Computer Science最新文献

英文 中文
Implementation of Classification Algorithms in Neo4j using IPL data 在Neo4j中使用IPL数据实现分类算法
Pub Date : 2021-11-28 DOI: 10.18535/ijecs/v10i11.4635
Surajit Medhi, H. Baruah
The main objective of this paper is to implement the classifications algorithms in Neo4j graph database using cypher query language. For implementing the classification algorithm, we have used Indian Premier League (IPL) dataset to predict the winner of the matches using some different features. The IPL is the most popular T20 cricket league in the world. The prediction models are based on the city where the matches were played, winner of the toss and decision of the toss.  In this paper we have implemented Naïve Bayes and K-Nearest Neighbors (KNN) classification algorithms using cypher query language. Different classifiers are used to predict the outcome of different games like football, volleyball, cricket etc, using python and R. In this paper we shall use cypher query language. We shall also compare and analysis the results which are given by Naïve Bayes and K-Nearest Neighbors algorithms to predict the winner of the matches.
本文的主要目标是在Neo4j图形数据库中使用密码查询语言实现分类算法。为了实现分类算法,我们使用印度超级联赛(IPL)数据集使用一些不同的特征来预测比赛的获胜者。IPL是世界上最受欢迎的T20板球联赛。预测模型是基于比赛举行的城市、掷硬币的获胜者和掷硬币的结果。本文利用密码查询语言实现了Naïve贝叶斯和k近邻(KNN)分类算法。不同的分类器用于预测不同比赛的结果,如足球,排球,板球等,使用python和r。在本文中,我们将使用密码查询语言。我们还将比较和分析Naïve贝叶斯和k近邻算法给出的结果,以预测比赛的获胜者。
{"title":"Implementation of Classification Algorithms in Neo4j using IPL data","authors":"Surajit Medhi, H. Baruah","doi":"10.18535/ijecs/v10i11.4635","DOIUrl":"https://doi.org/10.18535/ijecs/v10i11.4635","url":null,"abstract":"The main objective of this paper is to implement the classifications algorithms in Neo4j graph database using cypher query language. For implementing the classification algorithm, we have used Indian Premier League (IPL) dataset to predict the winner of the matches using some different features. The IPL is the most popular T20 cricket league in the world. The prediction models are based on the city where the matches were played, winner of the toss and decision of the toss.  In this paper we have implemented Naïve Bayes and K-Nearest Neighbors (KNN) classification algorithms using cypher query language. Different classifiers are used to predict the outcome of different games like football, volleyball, cricket etc, using python and R. In this paper we shall use cypher query language. We shall also compare and analysis the results which are given by Naïve Bayes and K-Nearest Neighbors algorithms to predict the winner of the matches.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"101 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120977502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the effectiveness of communication in adopting virtual team for software development 论软件开发中采用虚拟团队时沟通的有效性
Pub Date : 2021-11-28 DOI: 10.18535/ijecs/v10i11.4637
A. Q. Mohabuth, Bibi Neehad Nankoo
: Advancement in technology particularly the development of smart application has caused a paradigm shift in software development. Teams for developing software do not need to be physically present at all times. Members of development teams may be at remote sites but still communicate with each other. Technology has enabled the creation of virtual teams. While technology put at the disposal of software development teams a range of devices for supporting their communication interaction, members still face many challenges in terms of time difference, language barriers and cultural diversification. Ineffective communication among team members lead to delays in software development and contribute much to make project failures. The primary focus of this research is to identify how communication in virtual teams may become efficient. A survey is carried to assess the factors which affect communication in virtual teams. Different team sizes are considered and their relevance and differences in communication interaction are studied. More in-depth data are extracted for this research by interviewing potential members of virtual teams who work and interact from remote sites. The factors which influence communication interaction is finally established which help in successfully managing virtual team projects
技术的进步,特别是智能应用程序的发展,导致了软件开发的范式转变。开发软件的团队不需要一直在现场。开发团队的成员可能在远程站点,但仍然相互通信。技术使创建虚拟团队成为可能。虽然技术为软件开发团队提供了一系列支持他们交流互动的设备,但成员仍然面临着时差、语言障碍和文化多样化等诸多挑战。团队成员之间的无效沟通会导致软件开发的延迟,并在很大程度上导致项目失败。本研究的主要焦点是确定虚拟团队中的沟通如何变得有效。一项调查是进行评估的因素,影响沟通在虚拟团队。研究了不同规模的团队在沟通互动中的相关性和差异性。通过采访在远程站点工作和互动的虚拟团队的潜在成员,为本研究提取了更深入的数据。最后确定了影响沟通互动的因素,有助于成功管理虚拟团队项目
{"title":"Towards the effectiveness of communication in adopting virtual team for software development","authors":"A. Q. Mohabuth, Bibi Neehad Nankoo","doi":"10.18535/ijecs/v10i11.4637","DOIUrl":"https://doi.org/10.18535/ijecs/v10i11.4637","url":null,"abstract":": Advancement in technology particularly the development of smart application has caused a paradigm shift in software development. Teams for developing software do not need to be physically present at all times. Members of development teams may be at remote sites but still communicate with each other. Technology has enabled the creation of virtual teams. While technology put at the disposal of software development teams a range of devices for supporting their communication interaction, members still face many challenges in terms of time difference, language barriers and cultural diversification. Ineffective communication among team members lead to delays in software development and contribute much to make project failures. The primary focus of this research is to identify how communication in virtual teams may become efficient. A survey is carried to assess the factors which affect communication in virtual teams. Different team sizes are considered and their relevance and differences in communication interaction are studied. More in-depth data are extracted for this research by interviewing potential members of virtual teams who work and interact from remote sites. The factors which influence communication interaction is finally established which help in successfully managing virtual team projects","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121571582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A coupled models Hydrodynamics - Multi headed Deep convolutional neural network for rapid forecasting large-scale flood inundation 大尺度洪涝快速预报的水动力-多头深度卷积神经网络耦合模型
Pub Date : 2021-11-21 DOI: 10.18535/ijecs/v10i11.4636
S. Hadji
Modeling large-scale flood inundation requires weeks of calculations using complex fluid software. The state-of-the-art in operational hydraulic modeling does not currently allow flood real-time forecasting fields. Data driven models have small computational costs and fast computation times and may be useful to overcome this problem. In this paper, we propose a new modeling approach based on a coupled of Hydrodynamics finite element model and Multi-headed Deep convolutional neural network (MH-CNN) with rain precipitations as input to forecast rapidly the water depth reached in large floodplain with few hours-ahead. For this purpose, one first builds a database containing different simulations of the physical model according to several rain precipitation scenarios (historic and synthetic). The multi-headed convolutional neural network is then trained using the constructed database to predict water depths. The pre-trained model is applied successfully to simulate the real July 2014 flood inundation in an 870 km2 area of La Nive watershed in the south west of France. Because rain precipitation forecast data is more accessible than discharge one, this approach offers great potential for real-time flood modelling for ungauged large-scale territories, which represent a large part of floodplain in the world.
模拟大规模洪水泛滥需要使用复杂的流体软件进行数周的计算。目前最先进的操作水力模型还不能实现洪水的实时预测。数据驱动模型具有较小的计算成本和快速的计算时间,可能有助于克服这个问题。本文提出了一种基于流体力学有限元模型和多头深度卷积神经网络(MH-CNN)的耦合建模方法,以降水为输入,快速预测大型洪泛平原数小时前的水深。为此,首先建立一个数据库,其中包含根据几种降雨情景(历史的和合成的)对物理模型的不同模拟。然后利用构建的数据库对多头卷积神经网络进行训练,预测水深。将预训练的模型成功地应用于法国西南部拉尼夫流域870 km2的2014年7月洪水淹没模拟。由于降水预报数据比流量预报数据更容易获得,这种方法为未测量的大规模地区的实时洪水建模提供了巨大的潜力,这些地区代表了世界上很大一部分洪泛平原。
{"title":"A coupled models Hydrodynamics - Multi headed Deep convolutional neural network for rapid forecasting large-scale flood inundation","authors":"S. Hadji","doi":"10.18535/ijecs/v10i11.4636","DOIUrl":"https://doi.org/10.18535/ijecs/v10i11.4636","url":null,"abstract":"Modeling large-scale flood inundation requires weeks of calculations using complex fluid software. The state-of-the-art in operational hydraulic modeling does not currently allow flood real-time forecasting fields. Data driven models have small computational costs and fast computation times and may be useful to overcome this problem. In this paper, we propose a new modeling approach based on a coupled of Hydrodynamics finite element model and Multi-headed Deep convolutional neural network (MH-CNN) with rain precipitations as input to forecast rapidly the water depth reached in large floodplain with few hours-ahead. For this purpose, one first builds a database containing different simulations of the physical model according to several rain precipitation scenarios (historic and synthetic). The multi-headed convolutional neural network is then trained using the constructed database to predict water depths. The pre-trained model is applied successfully to simulate the real July 2014 flood inundation in an 870 km2 area of La Nive watershed in the south west of France. Because rain precipitation forecast data is more accessible than discharge one, this approach offers great potential for real-time flood modelling for ungauged large-scale territories, which represent a large part of floodplain in the world.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127933449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video-Based Rope Skipping Repetition Counting with ResNet Model 基于视频的跳绳重复计数与ResNet模型
Pub Date : 2021-11-12 DOI: 10.18535/ijecs/v10i11.4631
Xinxin Li, Jiawen Wang
Video Repetition Counting is one of the important research areas in computer vision. It focuses on estimating the number of repeating actions. In this paper, we propose a method for video-based rope skipping repetition counting that combines the ResNet Model and a counting algorithm. Each frame in the given video is first classified into two categories: upward and downward, describing its current motion status. Then the classification sequence of the video is processed by a statistical counting algorithm to obtain the final repetition number. The experiments on real-world videos show the efficiency of our model.
视频重复计数是计算机视觉领域的一个重要研究方向。它侧重于估计重复动作的数量。在本文中,我们提出了一种结合ResNet模型和计数算法的基于视频的跳绳重复计数方法。首先将给定视频中的每一帧分为向上和向下两类,描述其当前的运动状态。然后通过统计计数算法对视频的分类序列进行处理,得到最终的重复次数。在真实视频上的实验证明了该模型的有效性。
{"title":"Video-Based Rope Skipping Repetition Counting with ResNet Model","authors":"Xinxin Li, Jiawen Wang","doi":"10.18535/ijecs/v10i11.4631","DOIUrl":"https://doi.org/10.18535/ijecs/v10i11.4631","url":null,"abstract":"Video Repetition Counting is one of the important research areas in computer vision. It focuses on estimating the number of repeating actions. In this paper, we propose a method for video-based rope skipping repetition counting that combines the ResNet Model and a counting algorithm. Each frame in the given video is first classified into two categories: upward and downward, describing its current motion status. Then the classification sequence of the video is processed by a statistical counting algorithm to obtain the final repetition number. The experiments on real-world videos show the efficiency of our model.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122733073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECDSA: The Virtual Signature Set of Rules of a Higher Internet ECDSA:高等互联网的虚拟签名规则集
Pub Date : 2021-10-31 DOI: 10.18535/ijecs/v10i10.4630
Dr. Sivarama Prasad Kanakam
Computerized Currency is an electronic kind of cash. These days, everything is developing into digitization measure. This contains all properties like actual cash and furthermore permits prompt trades which will be reliably executed across the world while partner with upheld contraptions and organizations. In this paper we presented the SHA3-512 bit hashing algorithm and ECDSA algorithm for generation of digital signature. The Elliptic curve cryptography (ECC) is one of the greater promising technology on this area. ECC-enabled TLS is quicker and greater scalable on our servers and presents the equal or higher protection than the default cryptography in use at the web. one of the elliptic curve algorithm, the elliptic curve virtual signature algorithm (ECDSA), may be used to enhance overall performance at the Internet. CloudFlare now helps custom ECDSA certificate for our clients and that’s true for all people the use of the Internet.
计算机化货币是一种电子现金。如今,一切都在向数字化发展。这包括所有资产,如实际现金,并进一步允许即时交易,这些交易将在世界各地可靠地执行,同时与维护的设备和组织合作。本文提出了生成数字签名的SHA3-512位哈希算法和ECDSA算法。椭圆曲线密码技术(ECC)是该领域最有前途的技术之一。启用ecc的TLS在我们的服务器上速度更快,可扩展性更强,并且提供与web上使用的默认加密相同或更高的保护。椭圆曲线虚拟签名算法(ECDSA)是椭圆曲线算法中的一种,可用于提高Internet的整体性能。CloudFlare现在帮助我们的客户定制ECDSA证书,这对所有使用互联网的人来说都是如此。
{"title":"ECDSA: The Virtual Signature Set of Rules of a Higher Internet","authors":"Dr. Sivarama Prasad Kanakam","doi":"10.18535/ijecs/v10i10.4630","DOIUrl":"https://doi.org/10.18535/ijecs/v10i10.4630","url":null,"abstract":"Computerized Currency is an electronic kind of cash. These days, everything is developing into digitization measure. This contains all properties like actual cash and furthermore permits prompt trades which will be reliably executed across the world while partner with upheld contraptions and organizations. In this paper we presented the SHA3-512 bit hashing algorithm and ECDSA algorithm for generation of digital signature. The Elliptic curve cryptography (ECC) is one of the greater promising technology on this area. ECC-enabled TLS is quicker and greater scalable on our servers and presents the equal or higher protection than the default cryptography in use at the web. one of the elliptic curve algorithm, the elliptic curve virtual signature algorithm (ECDSA), may be used to enhance overall performance at the Internet. CloudFlare now helps custom ECDSA certificate for our clients and that’s true for all people the use of the Internet.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kronecker Product of matrices and their applications to self-adjoint two-point boundary value problems associated with first order matrix differential systems 矩阵的Kronecker积及其在一阶矩阵微分系统自伴随两点边值问题中的应用
Pub Date : 2021-10-31 DOI: 10.18535/ijecs/v10i10.4628
Sriram Bhagavatula, Dileep Durani Musa, Murty Kanuri
In this paper, we shall be concerned with Kronecker product or Tensor product of matrices and develop their properties in a systematic way. The properties of the Kronecker product of matrices is used as a tool to establish existence and uniqueness of solutions to two-point boundary value problems associated with system of first order differential systems. A new approach is described to solve the Kronecker product linear systems and establish best least square solutions to the problem. Several interesting examples are given to highlight the importance of Kronecker product of matrices. We present adjoint boundary value problems and deduce a set of necessary and sufficient conditions for the Kronecker product boundary value problem to be self-adjoint.
本文讨论了矩阵的克罗内克积或张量积,并系统地发展了它们的性质。利用矩阵的Kronecker积的性质,建立了一类一阶微分系统的两点边值问题解的存在唯一性。描述了求解Kronecker积线性系统的一种新方法,并建立了该问题的最佳最小二乘解。给出了几个有趣的例子来突出矩阵的克罗内克积的重要性。给出伴随边值问题,并推导出Kronecker积边值问题自伴随的一组充分必要条件。
{"title":"Kronecker Product of matrices and their applications to self-adjoint two-point boundary value problems associated with first order matrix differential systems","authors":"Sriram Bhagavatula, Dileep Durani Musa, Murty Kanuri","doi":"10.18535/ijecs/v10i10.4628","DOIUrl":"https://doi.org/10.18535/ijecs/v10i10.4628","url":null,"abstract":"In this paper, we shall be concerned with Kronecker product or Tensor product of matrices and develop their properties in a systematic way. The properties of the Kronecker product of matrices is used as a tool to establish existence and uniqueness of solutions to two-point boundary value problems associated with system of first order differential systems. A new approach is described to solve the Kronecker product linear systems and establish best least square solutions to the problem. Several interesting examples are given to highlight the importance of Kronecker product of matrices. We present adjoint boundary value problems and deduce a set of necessary and sufficient conditions for the Kronecker product boundary value problem to be self-adjoint.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122116768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification Using Transfer Learning and Deep Learning 使用迁移学习和深度学习的图像分类
Pub Date : 2021-09-23 DOI: 10.18535/IJECS/V10I9.4622
C. Desai
Deep learning models have demonstrated improved efficacy in image classification since the ImageNet Large Scale Visual Recognition Challenge started since 2010. Classification of images has further augmented in the field of computer vision with the dawn of transfer learning. To train a model on huge dataset demands huge computational resources and add a lot of cost to learning. Transfer learning allows to reduce on cost of learning and also help avoid reinventing the wheel. There are several pretrained models like VGG16, VGG19, ResNet50, Inceptionv3, EfficientNet etc which are widely used.   This paper demonstrates image classification using pretrained deep neural network model VGG16 which is trained on images from ImageNet dataset. After obtaining the convolutional base model, a new deep neural network model is built on top of it for image classification based on fully connected network. This classifier will use features extracted from the convolutional base model.
自2010年ImageNet大规模视觉识别挑战赛开始以来,深度学习模型在图像分类方面表现出了更高的效率。随着迁移学习的出现,图像分类在计算机视觉领域得到了进一步的拓展。在庞大的数据集上训练模型需要大量的计算资源,并且增加了大量的学习成本。迁移学习可以减少学习成本,也有助于避免重复发明轮子。有几种预训练模型,如VGG16, VGG19, ResNet50, Inceptionv3, EfficientNet等,被广泛使用。本文演示了使用预训练的深度神经网络模型VGG16对来自ImageNet数据集的图像进行分类。在得到卷积基模型后,在其基础上建立基于全连通网络的图像分类深度神经网络模型。该分类器将使用从卷积基础模型中提取的特征。
{"title":"Image Classification Using Transfer Learning and Deep Learning","authors":"C. Desai","doi":"10.18535/IJECS/V10I9.4622","DOIUrl":"https://doi.org/10.18535/IJECS/V10I9.4622","url":null,"abstract":"Deep learning models have demonstrated improved efficacy in image classification since the ImageNet Large Scale Visual Recognition Challenge started since 2010. Classification of images has further augmented in the field of computer vision with the dawn of transfer learning. To train a model on huge dataset demands huge computational resources and add a lot of cost to learning. Transfer learning allows to reduce on cost of learning and also help avoid reinventing the wheel. There are several pretrained models like VGG16, VGG19, ResNet50, Inceptionv3, EfficientNet etc which are widely used.   This paper demonstrates image classification using pretrained deep neural network model VGG16 which is trained on images from ImageNet dataset. After obtaining the convolutional base model, a new deep neural network model is built on top of it for image classification based on fully connected network. This classifier will use features extracted from the convolutional base model.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"78 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research On human motion recognition algorithm based on WLD 基于WLD的人体运动识别算法研究
Pub Date : 2021-08-24 DOI: 10.18535/ijecs/v10i8.4615
Sun Feng, Li-bing Xia
With the rapid development of intelligent technology,People’s lives have gradually entered the era of information and intelligentce,Wearable devices are becoming more and more popular,it is easier to use sensors to obtain data,even physiological data,from human body.When large amounts of data are collected by sensors,we can analyze and model them.the values of each characteristic are used to judge the user’s state,then according to the state we can provide users with more accurate and convenient services. In this paper,the data collected by different sensors are used to establish a prediction model and analyze the comparative effect of different recognition algorithms on the test data. The results of the experiment shows that the Bayesian method based on WLD identities the state of the human body better.
随着智能技术的飞速发展,人们的生活逐渐进入了信息化、智能化的时代,可穿戴设备越来越普及,利用传感器更容易从人体获取数据,甚至生理数据。当传感器收集到大量数据时,我们可以对它们进行分析和建模。每个特征的值被用来判断用户的状态,然后根据状态我们可以为用户提供更准确和方便的服务。本文利用不同传感器采集的数据建立预测模型,分析不同识别算法对测试数据的比较效果。实验结果表明,基于WLD的贝叶斯方法能更好地识别人体的状态。
{"title":"Research On human motion recognition algorithm based on WLD","authors":"Sun Feng, Li-bing Xia","doi":"10.18535/ijecs/v10i8.4615","DOIUrl":"https://doi.org/10.18535/ijecs/v10i8.4615","url":null,"abstract":"With the rapid development of intelligent technology,People’s lives have gradually entered the era of information and intelligentce,Wearable devices are becoming more and more popular,it is easier to use sensors to obtain data,even physiological data,from human body.When large amounts of data are collected by sensors,we can analyze and model them.the values of each characteristic are used to judge the user’s state,then according to the state we can provide users with more accurate and convenient services. In this paper,the data collected by different sensors are used to establish a prediction model and analyze the comparative effect of different recognition algorithms on the test data. The results of the experiment shows that the Bayesian method based on WLD identities the state of the human body better.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115499603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defensible Stalking Practice the Grounded Continuously Silhouette up-to-the-minute Wireless Assessing in Tactful Linkages 防御性跟踪练习接地连续剪影即时无线评估在机智的联系
Pub Date : 2021-08-11 DOI: 10.18535/ijecs/v10i8.4610
M. Mahalakshmi, D. Senduraja
Abstract— This paper proposes a Peripheral Silhouette Chasing Technique (PSCT) that lessens vigor feasting for stalking movable boards in wireless stratagem nets in footings of detecting and message vigor ingesting. PSCT preserves get-up-and-go by hire only a least quantity of feeler bulges contribute in announcement and accomplish detecting for objective pursuing. The trifling succeeding extent founded on the vehicular kinematics. The showing of objective’s kinematics agrees for clipping available share of the stalking part that cannot be instinctively visited by the movable objective within reserved time. So, sends the stalking expanse material to only the instrument bulges within negligible stalking expanse and wakes them up. Equated to the inheritance pattern which uses sphere-based pursuing expanse, our suggested structure uses not as much of integer of antennae for stalking in cooperation epistle and distinguishing deprived of objective gone. From side to side recreation, us show that PSCT leave behind the round-constructed arrangement with near 70% vitality exchangeable beneath convinced epitome circumstances. Index Term — Stratagem Linkage, Objective Stalking, Vigor, Stalking Expanse, Peripatetic Objective, Automobile, Kinematics, Round, Recognizing, Decree, Optimization.    
摘要:本文提出了一种外围轮廓追踪技术(Peripheral Silhouette Chasing Technique, PSCT),从探测和信息能量摄取两方面减少了无线策略网中跟踪活动板的能量消耗。PSCT保留了起跑状态,仅使用少量的触角凸起,有助于通告和完成对目标追求的探测。基于车辆运动学的微小后续范围。目标运动学的显示同意在预定时间内剪切可移动目标无法本能访问的跟踪部分的可用份额。因此,对可忽略的潜行范围内仅向仪器发送潜行空间材料并唤醒它们。与使用基于球体的追踪扩展的继承模式类似,我们建议的结构在没有目标的情况下,在合作书信中使用较少的天线整数来跟踪和识别。从侧面到侧面的重建,我们发现PSCT留下了圆形结构的安排,在令人信服的缩影环境下,有近70%的活力可以交换。索引术语-策略联动,目标跟踪,活力,跟踪范围,周边目标,汽车,运动学,圆,识别,法令,优化。
{"title":"Defensible Stalking Practice the Grounded Continuously Silhouette up-to-the-minute Wireless Assessing in Tactful Linkages","authors":"M. Mahalakshmi, D. Senduraja","doi":"10.18535/ijecs/v10i8.4610","DOIUrl":"https://doi.org/10.18535/ijecs/v10i8.4610","url":null,"abstract":"Abstract— This paper proposes a Peripheral Silhouette Chasing Technique (PSCT) that lessens vigor feasting for stalking movable boards in wireless stratagem nets in footings of detecting and message vigor ingesting. PSCT preserves get-up-and-go by hire only a least quantity of feeler bulges contribute in announcement and accomplish detecting for objective pursuing. The trifling succeeding extent founded on the vehicular kinematics. The showing of objective’s kinematics agrees for clipping available share of the stalking part that cannot be instinctively visited by the movable objective within reserved time. So, sends the stalking expanse material to only the instrument bulges within negligible stalking expanse and wakes them up. Equated to the inheritance pattern which uses sphere-based pursuing expanse, our suggested structure uses not as much of integer of antennae for stalking in cooperation epistle and distinguishing deprived of objective gone. From side to side recreation, us show that PSCT leave behind the round-constructed arrangement with near 70% vitality exchangeable beneath convinced epitome circumstances. \u0000Index Term — Stratagem Linkage, Objective Stalking, Vigor, Stalking Expanse, Peripatetic Objective, Automobile, Kinematics, Round, Recognizing, Decree, Optimization. \u0000  \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prevailing-Decree Verifier intended for Cryptographic Etiquettes 用于加密礼仪的现行法令验证器
Pub Date : 2021-08-11 DOI: 10.18535/ijecs/v10i8.4611
Dr.V. Isakkirajan
In recent years, a number of cryptographic etiquettes have been mechanically verified using a selection of inductive methods. These attestations typically want central a figure of recursive sets of messages, and need deep intuition into why the etiquette is correct. As a result, these proofs frequently require days to weeks of expert effort.We ensure advanced an involuntary verifier, which seems to overawe these glitches for many cryptographic protocols. The code of behavior text to concept a number of first-order invariant the proof commitments mitigating these invariants, along with any user-specified protocol properties are showed from the invariants with a tenacity theorem proved. The individual litheness in construction these invariants is to guesstimate, for each type of nonce and encryption engendered by the protocol, a formulary arresting conditions compulsory for that nonce encryption to be published. 
近年来,许多密码礼仪已经使用归纳方法的选择进行了机械验证。这些证明通常需要一个递归消息集的中心图,并且需要对为什么礼仪是正确的有深刻的直觉。因此,这些证明往往需要几天到几周的专家努力。我们确保先进的非自愿验证器,这似乎克服了许多加密协议的这些故障。行为文本的代码概念的一阶不变量的证明承诺减轻这些不变量,以及任何用户指定的协议属性显示从不变量与韧性定理证明。构造这些不变量的单个灵活性在于,对于协议生成的每种类型的随机数和加密,都要估计发布该随机数加密所必需的公式捕获条件。
{"title":"A Prevailing-Decree Verifier intended for Cryptographic Etiquettes","authors":"Dr.V. Isakkirajan","doi":"10.18535/ijecs/v10i8.4611","DOIUrl":"https://doi.org/10.18535/ijecs/v10i8.4611","url":null,"abstract":"In recent years, a number of cryptographic etiquettes have been mechanically verified using a selection of inductive methods. These attestations typically want central a figure of recursive sets of messages, and need deep intuition into why the etiquette is correct. As a result, these proofs frequently require days to weeks of expert effort.\u0000We ensure advanced an involuntary verifier, which seems to overawe these glitches for many cryptographic protocols. The code of behavior text to concept a number of first-order invariant the proof commitments mitigating these invariants, along with any user-specified protocol properties are showed from the invariants with a tenacity theorem proved. The individual litheness in construction these invariants is to guesstimate, for each type of nonce and encryption engendered by the protocol, a formulary arresting conditions compulsory for that nonce encryption to be published.\u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116200961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1