Classifying tiny objects in remote sensing images (e.g., a 20x20 pixels target within a resolution 1000x1000 image) is a significant challenge. This paper adopts a fused FPN (Feature Pyramid Network) to enhance the fe...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Classifying tiny objects in remote sensing images (e.g., a 20x20 pixels target within a resolution 1000x1000 image) is a significant challenge. This paper adopts a fused FPN (Feature Pyramid Network) to enhance the feature extraction capability for tiny objects. Additionally, the proposed multi-scale crop method can more effectively focus on the target objects. This network architecture improves overall accuracy by 14.4%.
This paper demonstrates solar PV (SPV) based mobile battery charging architecture employing a power electronics (DC-DC buck type) converter. The perturb and observe MPPT optimization algorithm is used to harvest the u...
详细信息
ISBN:
(数字)9798331542108
ISBN:
(纸本)9798331542115
This paper demonstrates solar PV (SPV) based mobile battery charging architecture employing a power electronics (DC-DC buck type) converter. The perturb and observe MPPT optimization algorithm is used to harvest the utmost power from the SSPV. In the DC-DC (buck) converter, a blocking diode is connected at the output side of the SPV to prevent the reverse current flow from the battery to the battery charger (DC-DC converter). The controller charges the mobile battery in three modes i.e., float charging stage, MPPT bulk charging stage and a steady voltage absorption stage. The studied mobile charging system is analyzed in MATLAB/Simulink environment. To incorporate the partially shading condition in the SPV of the proposed system, the solar irradiance of the SPV is decreased from 1000 W/m 2 to 400 W/m 2 for the time instance $t$ = 30 s to $t$ =40 s. This partial shading condition of the SPV is incorporated to observe the charging performances of the mobile battery by using a mobile battery charger controller. The performance evaluation of the proposed system designed in MATLAB/Simulink is carried out in terms of the dynamic performance of SPV and the mobile battery with charge controller.
Supply chain resilience is vital for ensuring smooth operations, especially in logistics, where transparency and risk mitigation are critical for managing disruptions. Integrating blockchain technology offers a robust...
详细信息
Security is an important quality attribute of software systems. Thus, designing secure architectures is a highly important, yet difficult and complex task. Moreover, there is a huge lack of security architecture exper...
详细信息
ISBN:
(数字)9798331533366
ISBN:
(纸本)9798331533373
Security is an important quality attribute of software systems. Thus, designing secure architectures is a highly important, yet difficult and complex task. Moreover, there is a huge lack of security architecture experts. To overcome these challenges, we aim to make security design knowledge reusable for architects by proposing SECURE, a recommendation approach to secure software design. It lifts design patterns and knowledge engineering concepts to security-related design recommendations for software architectures. This paper presents the central concepts of this approach, the overall recommendation process, and the first results from an initial case study.
As organizations increasingly rely on cloud computing for their critical operations, securing cloud infrastructures against cyber threats has become paramount. This paper presents a robust and scalable Intrusion Detec...
详细信息
ISBN:
(数字)9798350355611
ISBN:
(纸本)9798350355628
As organizations increasingly rely on cloud computing for their critical operations, securing cloud infrastructures against cyber threats has become paramount. This paper presents a robust and scalable Intrusion Detection system (IDS) designed for cloud environments, leveraging machine learning techniques for efficient anomaly detection. The proposed system aims to enhance the detection capabilities of traditional IDS by harnessing the power of diverse machine learning models within a cloud-based architecture. The machine learning approach combines multiple anomaly detection algorithms, each contributing its unique perspective, to form a comprehensive and adaptive defense mechanism. Leveraging cloud resources enables the system to dynamically scale its computational power based on demand, ensuring real-time monitoring and response to emerging threats. The IDS utilizes a combination of feature engineering and extraction methods to process large-scale data generated by cloud applications, allowing for effective anomaly detection without compromising system performance.
Against the backdrop of the proliferation of online media data, this study conducted an in-depth analysis of big data on eco-tour-related discussions in online media using natural language processing (NLP) techniques ...
详细信息
ISBN:
(数字)9798350389579
ISBN:
(纸本)9798350389586
Against the backdrop of the proliferation of online media data, this study conducted an in-depth analysis of big data on eco-tour-related discussions in online media using natural language processing (NLP) techniques to identify public perceptions and preferences for eco-tours. By applying Latent Dirichlet Allocation (LDA) models and sentiment analysis methods based on sentiment lexicons, this study systematically analyzed online media data collected over a one-year period. The analysis revealed three core thematic discussion areas: tourist destination characteristics, ecological conservation awareness and national-level certification, and natural landscape and ecological diversity. The results of the sentiment analysis showed an overall positive bias in the online media discussions, indicating a positive public perception of eco-tourism destinations. The findings provide data support for sustainable scientific management of eco-tourism and a new methodology for online media big data analysis in the field of smart tourism.
In the continuous expanding domain of cybersecurity, the rise of more cyber threats is also increasing. Therefore, it demands the development of more efficient defense strategies. In past, honeypots are used as lucrat...
详细信息
ISBN:
(数字)9798331530389
ISBN:
(纸本)9798331530396
In the continuous expanding domain of cybersecurity, the rise of more cyber threats is also increasing. Therefore, it demands the development of more efficient defense strategies. In past, honeypots are used as lucrative devices to attract malicious activity. However, most of the honeypot systems are static in nature, which may not be efficient in distributed environment. This paper introduces a Dynamic Distributed Honeypot system (DDHS) for the same purpose. In these honeypots nodes are dynamically distributed and connected via blockchain technology, aimed at improving threat detection and response capabilities. By distributing honeypots across multiple nodes in a blockchain network, the proposed system is more secure against external attack. The paper defines the system's architecture, assesses Blockchain performance in terms of attack probability.
Robotics education plays a crucial role in developing STEM skills. However, university-level courses often emphasize theoretical learning, which can lead to decreased student engagement and motivation. In this paper, ...
详细信息
ISBN:
(数字)9798331538606
ISBN:
(纸本)9798331538613
Robotics education plays a crucial role in developing STEM skills. However, university-level courses often emphasize theoretical learning, which can lead to decreased student engagement and motivation. In this paper, we tackle the challenge of providing hands-on robotics experience in higher education by adapting a mobile robot originally designed for competitions to be used in laboratory classes. Our approach integrates real-world robot operation into coursework, bridging the gap between simulation and physical implementation while maintaining accessibility. The robot's software is developed using ROS, and its effectiveness is assessed through student surveys. The results indicate that the platform increases student engagement and interest in robotics topics. Furthermore, feedback from teachers is also collected and confirmed that the platform boosts students' confidence and understanding of robotics.
Grain harvest at the time of grain maturity, grain drying and dehydration after the collection and packaging and timely return to storage is particularly important, China's intensive tanning farms are mostly, the ...
详细信息
ISBN:
(数字)9798331529482
ISBN:
(纸本)9798331529499
Grain harvest at the time of grain maturity, grain drying and dehydration after the collection and packaging and timely return to storage is particularly important, China's intensive tanning farms are mostly, the design of a new type of grain collection and bagging equipment to realize the rapid collection and packaging of grains. Using a combination of theoretical analysis and three-dimensional model construction method, the mechanical design scheme of grain collection and bagging machine is analyzed. According to the functional requirements of the device, the virtual prototype is built through SolidWorks, and the circuit control system is designed, and the three-dimensional model of the key mechanical parts is built through finite element analysis to simulate and analyze and strength check, and verify its reliability. The device design can meet the demand for rapid collection and bagging of grain, its structure is reasonable, simple operation, improve the efficiency of grain collection and bagging work, can better complete the setup work, has a certain application prospects and promotion value.
In order to bolster future wireless networks, there has been a great deal of interest in non-terrestrial networks, especially aerial platforms including high-altitude platform stations (HAPS) and uncrewed aerial vehic...
详细信息
ISBN:
(数字)9798350368369
ISBN:
(纸本)9798350368376
In order to bolster future wireless networks, there has been a great deal of interest in non-terrestrial networks, especially aerial platforms including high-altitude platform stations (HAPS) and uncrewed aerial vehicles (UAVs). These platforms can integrate advanced technologies such as reconfigurable intelligent surfaces (RIS) and non-orthogonal multiple access (NOMA). In this regard, this paper proposes a multi-layer network architecture consisting of HAPS and UAV, where the former acts as a HAPS super macro base station (HAPS-SMBS), while the latter serves as a relay node for the ground Internet of Things (IoT) devices. The UAV is equipped with active transmissive RIS, which is a novel technology with promising benefits. We also utilize multiple-input single-output (MISO) technology, i.e., multiple antennas at the HAPS-SMBS and a single antenna at the IoT devices. Additionally, we consider NOMA as the multiple access technology as well as the existence of hardware impairments as a practical limitation. We compare the proposed system model with various scenarios, all involving the HAPS-SMBS and RIS-equipped UAV relay combination, but with different types of RIS, antenna configurations, and access technologies. Sum rate and energy efficiency are used as performance metrics, and the findings demonstrate that, in comparison to all benchmarks, the proposed system yields significant performance gains. Moreover, hardware impairment limits the system performance at high transmit power levels.
暂无评论