Blind detection and identification processing such as communication signal detection, modulation identification, and individual radiation source identification under non-cooperative reception conditions is an importan...
Blind detection and identification processing such as communication signal detection, modulation identification, and individual radiation source identification under non-cooperative reception conditions is an important basis for radio spectrum monitoring and battlefield communication reconnaissance and confrontation. However, due to adverse factors such as strong interference and fast-changing electromagnetic environment during non-cooperative reception, complex and diverse communication signalsystems, and inability to fully grasp signal prior information, blind detection and identification of communication signals are extremely challenging. This article comprehensively sorts out the modulation recognition algorithm. The DL-based AMR algorithm is systematically reviewed from the three levels of the data set, network model, and final performance. Finally, the existing problems, potential research directions, and conclusions of AMR are outlined.
With the rapid development of internettechnology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r...
详细信息
ISBN:
(数字)9798350391367
ISBN:
(纸本)9798350391374
With the rapid development of internettechnology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In response to this challenge, this paper proposes a malware classification method based on deep learning and visualization techniques. The method first extracts sample features, then converts malware binary samples into image format, thus transforming abstract binary data into images with visual information. Subsequently, color mapping technique is applied to convert the processed images into color images. Furthermore, to address imbalanced datasets, this paper introduces data augmentation methods to ensure more balanced and comprehensive training of the model across different sample categories. Finally, an improved convolutional neural network architecture is employed for the classification detection of malware families, achieving accurate classification and identification of different malware families through learning and analysis of sample features. To evaluate the effectiveness of the proposed method, experiments are conducted on the Google Code Jam (GCJ) benchmark dataset. The experimental results demonstrate an accuracy rate of 99.29% on the GCJ dataset. Additionally, we also compared the performance of the improved method before and after, and found that the proposed method can provide more comprehensive feature representation and significantly improve classification accuracy and detection efficiency.
The constrained independent component analysis (cICA) algorithm has proven remarkable effectiveness in integrating prior information into the framework of independent component analysis (ICA). However, the necessity o...
详细信息
ISBN:
(数字)9798350351484
ISBN:
(纸本)9798350351491
The constrained independent component analysis (cICA) algorithm has proven remarkable effectiveness in integrating prior information into the framework of independent component analysis (ICA). However, the necessity of orthogonality for decoupling the constraints on individual sources restricts the optimization space and consequently the separation performance of cICA algorithms. To overcome this limitation, we propose a decoupling method called non-orthogonal adaptive constrained independent vector analysis with a bounded multivariate generalized Gaussian mixture model (non-orthogonal acIVABMGGMM), designed to address the drawbacks of independent component analysis in modeling multivariate data. This structure has the capability to incorporate prior knowledge regarding the sources or the mixing coefficients into the cost function of IVA. A robust decoupling strategy is needed to enable this integration. We also identify the brain regions impacted by Alzheimer’s disease by using the extracted components from our non-orthogonal acIVABMGGMM model. We demonstrate the superior performance of non-orthogonal acIVABMGGMM over the basic IVA model through experiments conducted on both simulated and real medical imaging data.
This research provides a convolutional neural network (CNN) model for feature recognition between real and bogus ones. The model was trained across ten epochs with a batch size of 64 and a learning rate of 0.001. The ...
详细信息
ISBN:
(数字)9798350368949
ISBN:
(纸本)9798350368956
This research provides a convolutional neural network (CNN) model for feature recognition between real and bogus ones. The model was trained across ten epochs with a batch size of 64 and a learning rate of 0.001. The design includes many convolutional layers after pooling layers and activation functions (ReLU) to aid in feature extraction. Flexibility of the model was improved by use of data augmentation methodologies. The training approach includes 2,278 photographs for validation and a set of 6,799 images for training. On the validation set, the model demonstrated to be 98.5% accurate, thereby proving its capacity to distinguish between true and spurious attributes. The end loss evaluated at 0.05 reflects a well-fitted model since the loss throughout training fell considerably. These results illustrate how successfully CNNs might manage face classification.
Blind detection of communication signals is a challenging task. In this paper, a general and novel blind detection method is proposed based on the similarity between communication signal detection and image object det...
详细信息
Recently, different research groups have found that the gallery composition of a face database can induce performance differentials to facial identification systems in which a probe image is compared against up to all...
详细信息
ISBN:
(纸本)9781665401913
Recently, different research groups have found that the gallery composition of a face database can induce performance differentials to facial identification systems in which a probe image is compared against up to all stored reference images to reach a biometric decision. This negative effect has been referred to as "watchlist imbalance effect" by the researchers and exhibits high relevance in real applications of biometrics, most prominently in identification searches against criminal databases and blacklists. In this work, we conduct a detailed analysis of said effect. In particular, we compare empiric observations with theoretical estimates, based on the verification performance across demographic groups and the composition of the used gallery. The experimental evaluations are conducted by systematically varying the size and demographic composition of a cleaned subset of the academic MORPH database and utilising the state-of-the-art open-source ArcFace face recognition system.
This paper proposes a CMOS image sensor that can achieves imaging and energy harvesting simultaneously without introducing additional P-N junctions in the pirel array. The proposed pixel utilizes the vertical N+P-well...
This paper proposes a CMOS image sensor that can achieves imaging and energy harvesting simultaneously without introducing additional P-N junctions in the pirel array. The proposed pixel utilizes the vertical N+P-well/DNW/P-sub structures as photodiodes based on a standard 180 nm CMOS mixed-signal process. The N+P-well is used for imaging, while the P-well/DNW and DNW/P-sub are used for energy harvesting with shorting P-well and P-sub together. Moreover, the traditional 4 T pirel has been improved by using CMOS pairs as the switches and zero-threshold NMOS as the source follower. The rail-to-rail pixel output swing can be achieved. Simulation results show that the dynamic range is increased by 13.4 dB compared with the traditional 4 T pirel. Single pixel occupies an area of $11 \times 13~\mathrm{mm}^image$ with a fill factor of 72%. An image sensor with 32 × 32 proposed pixel array and a dual-channel PWM quantizer is designed. Simulation results show that the average power consumption of the image sensor is approximately 6.7$\mu$W@2MHz.
The echo information processing platform is an important part of the phased array radar system. With the increasing demands of the airborne phased array radar mission on bus transmission bandwidth, computational proce...
详细信息
The development of internet has lead the technology to internet of Things (IoT). As the internet of Things is used for sending many types of data through many interconnected devices, the risk of stealing the data owne...
详细信息
ISBN:
(纸本)9781665423830
The development of internet has lead the technology to internet of Things (IoT). As the internet of Things is used for sending many types of data through many interconnected devices, the risk of stealing the data owner's right has been increased. But, even though this risk comes up, the high demand for sending data through IoT is still high. Thus, watermarking schemes is used for preventing this problem. Watermarking can be used for protecting the owner's rights in the form of a digital image, and this will be useful to be implemented in IoT. In this paper, an enhancement of Spread Spectrum (SS) based audio watermarking system against MP3 Compression attacks using Genetic Algorithm process is proposed. The main idea of the system will be using Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) as the pre-processing method and then using Multibit Spread Spectrum to embed the watermark. The simulation results show that the Genetic Algorithm could optimize between imperceptibility and robustness resulting a good result against the MP3 Compression attack.
image emotion recognition and image aesthetic assessment are recent research hotspots in user perception of image content. However, for the study of image aesthetics and image emotion, the vast majority of studies are...
详细信息
暂无评论