<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>2022</title>
<link>http://210.212.227.212:8080/xmlui/handle/123456789/161</link>
<description/>
<pubDate>Sun, 17 May 2026 00:07:20 GMT</pubDate>
<dc:date>2026-05-17T00:07:20Z</dc:date>
<image>
<title>2022</title>
<url>http://localhost:8080/xmlui/bitstream/id/3ad6754b-3899-444f-b659-78e7a669ed03/close-up-handwritten-whiteboard-year-168763957.jpg</url>
<link>http://210.212.227.212:8080/xmlui/handle/123456789/161</link>
</image>
<item>
<title>TEXT EXTRACTION FROM LOW QUALITY IMAGES USING DEEP LEARNING TECHNIQUES</title>
<link>http://210.212.227.212:8080/xmlui/handle/123456789/273</link>
<description>TEXT EXTRACTION FROM LOW QUALITY IMAGES USING DEEP LEARNING TECHNIQUES
Asha, Simon; Aneesh, G Nath
Today whatever look can see presence of digital image.Every day may groups&#13;
like doctors, engineers, and students etc. release many images for their dif ferent needs.These images may contain both textual and non textual data.&#13;
Text present in such images can provide meaningful information for content&#13;
based repossession and many applications of computer vision like image un der standing, reading number plates of moving vehicles and context retrieval&#13;
for the investigation purposes.Text information found in these images may&#13;
very different in fond size, style, alignment and orientation. In this way, it&#13;
is very difficult to identify items with different characteristics and even more&#13;
difficult to retrieve text if image is blurred or low resolution.There are many&#13;
existing techniques for recover textual information from clear image. So in&#13;
this paper, introduces a method to recover text from a blurred or low reso lution image. The proposed technology is comprised of three main steps.(a)&#13;
The deblurring process is applied to recover the clear image. (b) Extract&#13;
text from images using text localization, segmentation and binarization tech niques (c) Evaluation of proposed model. Input image debluring achieved by&#13;
using super resolution convolution network. Text extraction can be achieved&#13;
by using text extraction network. Here, use text detection to identify the&#13;
text region on input image after that can find the exact position of text&#13;
by using text localization and text segmentation separates the text from its&#13;
background. Extensive experiments have been conducted on a synthetically&#13;
generated dataset. Experimental results and analysis show that this system&#13;
has better performance in terms of quantitative evaluation.
</description>
<pubDate>Thu, 01 Sep 2022 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://210.212.227.212:8080/xmlui/handle/123456789/273</guid>
<dc:date>2022-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices</title>
<link>http://210.212.227.212:8080/xmlui/handle/123456789/272</link>
<description>A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
Athira, Joshi; Ansamma, John
Concerns about the threat of piracy and the spread of viruses have been raised as a&#13;
result of the rise in popularity of Android applications. Through applications, malware is&#13;
frequently propagated in the mobile environment. People frequently grant applications rights&#13;
without fully understanding their purpose. Android devices are used by almost 2.8 billion&#13;
people worldwide. Therefore, the requirement for a reliable Android malware detection&#13;
system is unavoidable. In order to provide a real-time and responsive detection environment&#13;
for Android mobile devices, this paper proposes MobiTive, an efficient Android malware&#13;
detection system. A more practical and secure application solution is MobiTive, which&#13;
checks and monitors APK files before installation. MobiTive is concentrating on mobile&#13;
and server-side platforms. APK files are mined for API calls and Manifest files of both&#13;
malware and benign apps, and this raw data is then fed into convolutional neural networks.&#13;
After being trained independently, networks including GRU, BI-GRU, STACKED GRU,&#13;
and LSTM were shown to be of good performance. Its shown that BI-GRU have the highest&#13;
performance. As quantization is done for mobile device adaptation, network model size&#13;
varies. Deep Learning model must be converted to Tensorflow-lite model due to limited&#13;
computing power and resource availability in order to function well on the mobile platform.&#13;
MobiTive has been evaluated for effectiveness on a variety of mobile devices, and it achieves&#13;
detection accuracy of 90.26% percent.
</description>
<pubDate>Mon, 01 Aug 2022 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://210.212.227.212:8080/xmlui/handle/123456789/272</guid>
<dc:date>2022-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>A COURSE RECOMMENDATION SYSTEM BASED ON LEARNER CAPACITY USING RESTRICTED BOLTZMANN MACHINE</title>
<link>http://210.212.227.212:8080/xmlui/handle/123456789/271</link>
<description>A COURSE RECOMMENDATION SYSTEM BASED ON LEARNER CAPACITY USING RESTRICTED BOLTZMANN MACHINE
Dhanya, M; Thushara, A
The education field has undergone a rapid transformation with the advent of&#13;
online courses, that aid in skill acquisition and life long learning. However, in&#13;
the present scenario, the major limitation of these courses is the high dropout&#13;
rate. This is due to the poor course recommendation and the low learner in teraction associated with online courses. In order to reduce the dropout rate,&#13;
course recommendation must be given based on the learning capacity of stu dents. In this weak learner interaction scenario, cognitive diagnosis, which is&#13;
a psychometric technique used to discover the proficiency level of students in&#13;
specific knowledge components could not be used. Instead, a variant of this&#13;
technique called Multi-dimensional Item Response Theory (MIRT) can be in corporated in course recommendation systems to suitably represent learner’s&#13;
learning state by obtaining implicit response on the followed course. In this&#13;
work, course recommendation based on learner capacity is implemented by&#13;
integrating MIRT into collaborative filtering, which is implemented using&#13;
Restricted Boltzmann Machine. The Open University Analytics Dataset is&#13;
used as the base experimental data. Experimental results and analysis show&#13;
that this course recommendation system has better performance in terms of&#13;
different quantitative metrics like precision and mean absolute error.
</description>
<pubDate>Fri, 01 Jul 2022 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://210.212.227.212:8080/xmlui/handle/123456789/271</guid>
<dc:date>2022-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>INTRUSION DETECTION SYSTEM USING OPENPOSE</title>
<link>http://210.212.227.212:8080/xmlui/handle/123456789/270</link>
<description>INTRUSION DETECTION SYSTEM USING OPENPOSE
Divya, C P; Dimple A, Shahjahan
Intrusion Detection System(IDS) is a monitoring system that identify un usual activity and send out alerts when it does. It is a core part of site’s&#13;
safety and security strategy. A computer vision task that requires recogniz ing, associating, and tracking semantic key points is human posture estima tion and tracking. Human Action Recognition (HAR) methods are gaining&#13;
importance, with the emerging advancements in computer vision and pat tern recognition. There are various methods present for action recognition&#13;
and each technique has its advantages and disadvantages. Despite being a lot&#13;
of research work, action recognition is still a challenging and complex task.&#13;
The precision of posture estimate has been limited because of the significant&#13;
processing resources required for semantic keypoint tracking in live video&#13;
data. Human Pose Estimation is a core problem for understanding people in&#13;
videos and images. This project presents an effective method for improving&#13;
existing security systems and to further automate the threat prevention and&#13;
protection procedure. This method identifies human wall climbing activity,&#13;
that occur within the video range and detects unlawful or suspicious activi ties, alert if detected. This work is divided into two parts; multi person pose&#13;
estimation and action recogonition and alerting using estimated pose. Open Pose library is used for the realtime 2D pose estima- tion and it consists of&#13;
recognition of 18 body key points and joint locations and a final parsing to&#13;
get skeleton. These are further used to extract robust motion features, then&#13;
a Convolution Neural Network (CNN) is used to recognize the activities as sociated with these features. Different subjects from different camera angles&#13;
are used to make the approach person-independent. The proposed method&#13;
shows best result with promising performance, reaching an overall accuracy&#13;
of 91.6%
</description>
<pubDate>Thu, 01 Sep 2022 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://210.212.227.212:8080/xmlui/handle/123456789/270</guid>
<dc:date>2022-09-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
