Sensor-based and vision-based human activity recognition: A comprehensive survey
Human activity recognition (HAR) technology that analyzes data acquired from various types
of sensing devices, including vision sensors and embedded sensors, has motivated the …
of sensing devices, including vision sensors and embedded sensors, has motivated the …
Human activity recognition using inertial, physiological and environmental sensors: A comprehensive survey
In the last decade, Human Activity Recognition (HAR) has become a vibrant research area,
especially due to the spread of electronic devices such as smartphones, smartwatches and …
especially due to the spread of electronic devices such as smartphones, smartwatches and …
A survey on wearable sensor modality centred human activity recognition in health care
Increased life expectancy coupled with declining birth rates is leading to an aging
population structure. Aging-caused changes, such as physical or cognitive decline, could …
population structure. Aging-caused changes, such as physical or cognitive decline, could …
Fast image encryption algorithm based on parallel computing system
X Wang, L Feng, H Zhao - Information Sciences, 2019 - Elsevier
To ensure security, image encryption algorithms generally include two stages: permutation
and diffusion. The traditional image permutation algorithms include the sort-based …
and diffusion. The traditional image permutation algorithms include the sort-based …
Recent trends in machine learning for human activity recognition—A survey
S Ramasamy Ramamurthy… - … Reviews: Data Mining and …, 2018 - Wiley Online Library
There has been an upsurge recently in investigating machine learning techniques for activity
recognition (AR) problems as they have been very effective in extracting and learning …
recognition (AR) problems as they have been very effective in extracting and learning …
Efficient fire detection for uncertain surveillance environment
Tactile Internet can combine multiple technologies by enabling intelligence via mobile edge
computing and data transmission over a 5G network. Recently, several convolutional neural …
computing and data transmission over a 5G network. Recently, several convolutional neural …
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
D Li, L Deng, BB Gupta, H Wang, C Choi - Information Sciences, 2019 - Elsevier
The rise of machine learning increases the current computing capabilities and paves the
way to novel disruptive applications. In the current era of big data, the application of image …
way to novel disruptive applications. In the current era of big data, the application of image …
A survey of deep learning-based human activity recognition in radar
Radar, as one of the sensors for human activity recognition (HAR), has unique
characteristics such as privacy protection and contactless sensing. Radar-based HAR has …
characteristics such as privacy protection and contactless sensing. Radar-based HAR has …
Secure surveillance framework for IoT systems using probabilistic image encryption
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by
intelligent integration of video summarization and image encryption. First, an efficient video …
intelligent integration of video summarization and image encryption. First, an efficient video …
Beyond binary labels: political ideology prediction of twitter users
Automatic political orientation prediction from social media posts has to date proven
successful only in distinguishing between publicly declared liberals and conservatives in the …
successful only in distinguishing between publicly declared liberals and conservatives in the …