Vehicle detection (VD) plays a very essential role in Intelligent Transportation Systems (ITS) that have been intensively studied within the past years. The need for intelligent facilities expanded because the total number of vehicles is increasing rapidly in urban zones. Traffic monitoring is an important element in the intelligent transportation system, which involves the detection, classification, tracking, and counting of vehicles. One of the key advantages of traffic video detection is that it provides traffic supervisors with the means to decrease congestion and improve highway planning. Vehicle detection in videos combines image processing in real-time with computerized pattern recognition in flexible stages. The real-time processing is very critical to keep the appropriate functionality of automated or continuously working systems. VD in road traffics has numerous applications in the transportation engineering field. In this review, different automated VD systems have been surveyed, with a focus on systems where the rectilinear stationary camera is positioned above intersections in the road rather than being mounted on the vehicle. Generally, three steps are utilized to acquire traffic condition information, including background subtraction (BS), vehicle detection and vehicle counting. First, we illustrate the concept of vehicle detection and discuss background subtraction for acquiring only moving objects. Then a variety of algorithms and techniques developed to detect vehicles are discussed beside illustrating their advantages and limitations. Finally, some limitations shared between the systems are demonstrated, such as the definition of ROI, focusing on only one aspect of detection, and the variation of accuracy with quality of videos. At the point when one can detect and classify vehicles, then it is probable to more improve the flow of the traffic and even give enormous information that can be valuable for many applications in the future.
The Internet of Things (IoT) has been influential in predicting major diseases in current practice. The deep learning (DL) technique is vital in monitoring and controlling the functioning of the healthcare system and ensuring an effective decision-making process. In this study, we aimed to develop a framework implementing the IoT and DL to identify lung cancer. The accurate and efficient prediction of disease is a challenging task. The proposed model deploys a DL process with a multi-layered non-local Bayes (NL Bayes) model to manage the process of early diagnosis. The Internet of Medical Things (IoMT) could be useful in determining factors that could enable the effective sorting of quality values through the use of sensors and image processing techniques. We studied the proposed model by analyzing its results with regard to specific attributes such as accuracy, quality, and system process efficiency. In this study, we aimed to overcome problems in the existing process through the practical results of a computational comparison process. The proposed model provided a low error rate (2%, 5%) and an increase in the number of instance values. The experimental results led us to conclude that the proposed model can make predictions based on images with high sensitivity and better precision values compared to other specific results. The proposed model achieved the expected accuracy (81%, 95%), the expected specificity (80%, 98%), and the expected sensitivity (80%, 99%). This model is adequate for real-time health monitoring systems in the prediction of lung cancer and can enable effective decision-making with the use of DL techniques.
<p><strong>Abstract—</strong> Clustering is a major exploratory data mining activity, and a popular statistical data analysis technique used in many fields. Cluster analysis generally speaking isn't just an automated function, but rather reiterated information exploration procedure or multipurpose dynamic optimisation Comprising trial and error. Parameters for pre-processing and modeling data frequently need to be modified until the output hits the desired properties. -Data points in fuzzy clustering may probably belong to several clusters. Each Data Point is assigned membership grades. Such grades of membership reflect the degree to which data points belong to each cluster. The Fuzzy C-means clustering (FCM) algorithm is among the most widely used fuzzy clustering algorithms. In this paper We use this method to find typological analysis for dynamic Ad Hoc network nodes movement and demonstrate that we can achieve good performance of fuzziness on a simulated data set of dynamic ad hoc network nodes (DANET) and How to use this principle to formulate node clustering as a partitioning problem. Cluster analysis aims at grouping a collection of nodes into clusters in such a way that nodes seeing a high degree of correlation within the same cluster, whereas nodes members of various clusters are extremely dissimilar in nature. The FCM algorithm is used for implementation and evaluation the simulated data set using NS2 simulator with optimized AODV protocol. The results from the algorithm 's application show the technique achieved the maximum values of stability for both cluster centers and nodes (98.41 %, 99.99 %) respectively.<strong></strong></p>
Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sharing and the generating random positions of hiding. This method has been in hiding a text file and recovered without loss of information, as well as not noticing any deformation of the image. Where it was hiding a text file size of 20 KB in image cover (250x250) pixels, the result of MSE is 0.696 and PSNR is 49.211.
Nowadays, numerous attacks can be considered high risks in terms of the security of Wireless Sensor Networks (WSN). As a result, different applications are introduced to manage the data and information exchange and related security sides to be save in transmission of data. Recently, most of the security attacks are classified as cyber ones. These attacks interest in the system halting and destroying the data rather than stealing the data. In this paper, a cyber-attacks detection system is proposed based on an intelligent hybrid model that uses deep and machine learning technologies. The proposed model improves the cyber-attack detection speed. In addition, a feature reduction model is proposed using machine learning methods (PCA and SVD) to select the most related features to the adopted classes of attacks. This can positively affect the deep-learning model complexity. The obtained results demonstrate the superiority of the proposed hybrid model-based cyber detection system in comparison to the traditional ones in reaching an accuracy of 99.98%, 100%, 100%, 100% for precision, recall, and F1-measure respectively, and reducing the time to 23s for the datasets of Message Queuing Telemetry Transport-Dataset (MQTT-DS) and Wireless Sensor Networks Dataset (WSN-DS).
In the last years, many types of research have introduced different methods and techniques for a correct and reliable image retrieval system. The goal of this paper is a comparison study between two different methods which are the Grey level co-occurrence matrix and the Hu invariants moments, and this study is done by building up an image retrieval system employing each method separately and comparing between the results. The Euclidian distance measure is used to compute the similarity between the query image and database images. Both systems are evaluated according to the measures that are used in detection, description, and matching fields which are precision, recall, and accuracy, and addition to that mean square error (MSE) and structural similarity index (SSIM) is used. And as it shows from the results the Grey level co-occurrence matrix (GLCM) had outstanding and better results from the Hu invariants moment method.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.