In recent years, deep learning (DL) technology has developed rapidly in the field of image segmentation, which improves the accuracy of image segmentation compared with traditional image segmentation. This paper propo...
详细信息
ISBN:
(纸本)9798350350920
In recent years, deep learning (DL) technology has developed rapidly in the field of image segmentation, which improves the accuracy of image segmentation compared with traditional image segmentation. This paper proposes an improved Mask R-CNN network based on cavity convolution and attention mechanism, which is more suitable for warship image segmentation. In addition, to solve the problem of insufficient data sets, the method of data enhancement is adopted to establish warship data sets. Through experiments, it is found that the warship image segmentation method in this paper can get more accurate segmentation effect on the warship image segmentation task, in which the average segmentation accuracy of small target warships is improved by about 8.5%.
In the rapidly evolving environment of the internet of Things (IoT), anomaly detection plays an important role in ensuring the security and reliability of connected systems. Traditional approaches often struggle to ca...
详细信息
ISBN:
(纸本)9798350388978;9798350388961
In the rapidly evolving environment of the internet of Things (IoT), anomaly detection plays an important role in ensuring the security and reliability of connected systems. Traditional approaches often struggle to capture subtle patterns and anomalies in complex IoT data. This paper introduces a new perspective by utilizing image transformation techniques, specifically the Gramian Angular Field (GAF), Markov Transition Field (MTF), and Recurrence Plot (RP), coupled with deep learning models for better anomaly detection. This study presents a comparative study to evaluate the performance of these image transformation methods and assess their effectiveness in detecting anomalies in IoT data. The comparative results show that RP with CNN has the superior performance compared to other image transformation techniques.
This paper describes a work on an acoustic user authentication system using smartphones. The system implements two-factor authentication for Windows workstations, where the authentication procedure, including locking ...
详细信息
ISBN:
(纸本)9798350348194;9798350348187
This paper describes a work on an acoustic user authentication system using smartphones. The system implements two-factor authentication for Windows workstations, where the authentication procedure, including locking and unlocking the workstation is transparent to the user. Since workstations and smartphones have built-in microphones and speakers, the system does not require additional hardware. The uniqueness of the solution is being based on acoustic signals. These signals are transmitted by the user's smartphone and received by the workstation microphone. The system is "pure play acoustic" since no wiring or radio transmission is used. The system configuration supports multiple users in the same area. Eavesdropping prevention is provided by sequentially generated random one-time keys. Acoustic communication can be applied either in the audible range or beyond the human hearing range depending on the sampling rate of the smartphone and the workstation.
This paper presents an innovative architecture based on a Cycle Generative Adversarial Network (CycleGAN) for the synthesis of high-quality depth maps from monocular images. The proposed architecture leverages a diver...
详细信息
images captured in low-light settings often manifest issues, notably reduced brightness and amplified noise. Addressing these concerns, our research elucidates a sophisticated technique crafted to enhance the fidelity...
详细信息
ISBN:
(纸本)9798350309461
images captured in low-light settings often manifest issues, notably reduced brightness and amplified noise. Addressing these concerns, our research elucidates a sophisticated technique crafted to enhance the fidelity of images taken under such adverse circumstances. During the image acquisition phase, the camera sensor meticulously logs the raw RGB data. This information subsequently undergoes a comprehensive optimization and refinement process facilitated by the camera's imagesignal Processor (ISP), culminating in the finalized RGB depiction. We delve deeply into the intricacies of the ISP processing trajectory and unveil a methodology termed PLET (Patch-based Low-light Enhancement Transformer), dedicated to refining low-light image quality to mirror that of well-lit conditions. For an intricate processing and comprehensive analysis of the image constituents, we employ the image patch approach, achieving not only pinpointed image refinement but also a profound comprehension of image content. Rigorous experimental assessments reveal that our approach excels in elevating image luminance and curtailing noise, cementing its efficacy in low-light image enhancement endeavors.
In outdoor aquaculture farms, farmers are often unable to observe the situation in aquaculture tanks due to poor water quality, which may cause them to fail to detect problems and take timely measures, especially for ...
详细信息
ISBN:
(纸本)9798350351774;9798350351767
In outdoor aquaculture farms, farmers are often unable to observe the situation in aquaculture tanks due to poor water quality, which may cause them to fail to detect problems and take timely measures, especially for typical benthic aquatics such as white shrimp. For example, when the harmful substances in the water exceed the normal range, the farmer may not treat them quickly, and the white shrimp will grow slowly or die. Therefore, for underwater water quality image enhancement, this paper proposes an underwater image enhancement scheme for turbid underwater aquaculture environments based on deep learning. This scheme can effectively improve underwater images' clarity, thereby improving the effect of underwater monitoring. Through this technology, farmers can more clearly observe the conditions in aquaculture ponds, improving aquaculture efficiency and promoting the development of the aquaculture industry.
In the realm of the Industrial internet of Things (IIoT), safeguarding visual data is paramount to prevent unauthorized access and tampering. This paper presents a new approach to image encryption, harnessing the powe...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
In the realm of the Industrial internet of Things (IIoT), safeguarding visual data is paramount to prevent unauthorized access and tampering. This paper presents a new approach to image encryption, harnessing the power of DNA sequences and chaos models tailored for IIoT environments. The proposed algorithm employs DNA trees to establish a unique correspondence between pixels and DNA bases, facilitating robust encryption. The secret key, an integral component, offers independence and flexibility in generating chaotic variables crucial for encryption. The encryption process encompasses DNA sequence conversion, chaos-basedimage generation, and multi-round permutation and substitution steps. Experimental results underscore the algorithm's efficacy, demonstrating better statistical security for cipher images within short timeframes. Histograms exhibit flat distributions with low correlation values, approaching theoretical entropy values. Comparative performance analysis reveals the algorithm's superiority over state-of-the-art counterparts. This innovative algorithm holds promise for embedding devices within IIoT environments, enabling efficient pre-processing steps and facilitating the generation of cipher images with minimal energy consumption. Its versatility extends to accommodating various image sizes, ensuring dynamic image cipher creation with high-quality security measures.
Underwater single image super-resolution (UISR) is a challenging task as these images frequently suffer from poor visibility. The best-published UISR works continue to suffer from color degradation, poor texture repre...
详细信息
ISBN:
(纸本)9798350344868;9798350344851
Underwater single image super-resolution (UISR) is a challenging task as these images frequently suffer from poor visibility. The best-published UISR works continue to suffer from color degradation, poor texture representation, and loss of finer (high-frequency) details. We propose a novel deep learning-based (DL) UISR model that incorporates spatial information as well as the transformed (wavelet) coefficient of degraded low-resolution (LR) underwater images by intelligent feature management. To ensure the visual quality of the super-resolved image, color channel-specific L1 loss, perceptual loss, and difference of Gaussian (DoG) loss are used in tandem with SSIM loss. We employ publicly available datasets, namely UFO-120 and USR-248, to evaluate the proposed model. The results of our experiments show that our model outperforms existing state-of-the-art methods (e.g., similar to 9.45%/similar to 1.77% in SSIM and similar to 0.91%/similar to 1.44% in PSNR on UFO-120/USR-248 x4, respectively), as demonstrated through quantitative measurements and visual quality assessments.
The internet of Things, or IoT, is a rapidly expanding field that has been integrated into numerous different industries. Thanks to this technology, devices may send, receive, and analyze data without the assistance o...
详细信息
ISBN:
(数字)9798350384895
ISBN:
(纸本)9798350384901;9798350384895
The internet of Things, or IoT, is a rapidly expanding field that has been integrated into numerous different industries. Thanks to this technology, devices may send, receive, and analyze data without the assistance of a human. IoT security and privacy concerns continue to be a significant obstacle, despite the fact that it has gained widespread acceptance in a number of important domains due to its ability to simplify human life and enhance service quality. To protect IoT networks from different attacks, an anomaly-based intrusion detection system (IDS) can be included as a security feature. In order to combat various cyberattacks in internet of Things environments, this study suggests an anomaly-based intrusion detection system (IDS). The suggested approach makes use of in order to enhance anomaly identification performance and reduce the dimension of the data characteristics..
In the realm of internet communication, memes have emerged as a powerful means of expression, swiftly disseminating emotions and ideas. The ability to classify memes, particularly in languages with regional nuances su...
详细信息
暂无评论