In the quest to enhance biodiversity conservation and support ecological monitoring, the identification of bird species through automatic recognition systems has emerged as a vital tool. This study introduces a novel ...
详细信息
As the internet of Things (IoT) technology continues to revolutionize, modern industrial production systems are undergoing profound changes. Current production methods require the expansion of production space to acco...
详细信息
To improve the efficiency and accuracy of wind turbine fault detection while maintaining data confidentiality, we propose a convolutional neural network model that integrates Gram's Angle Summation Field (GAF) wit...
详细信息
A technique utilizing laser point cloud data has been developed for the surveillance of the operational status of a double-column center fracture horizontal rotary disconnector switch. The method includes an action mo...
详细信息
A technique utilizing laser point cloud data has been developed for the surveillance of the operational status of a double-column center fracture horizontal rotary disconnector switch. The method includes an action monitoring model for isolating switches to identify and segment point cloud data of isolating switch conducting arm. The model consists of a local feature extraction module, a point cloud feature dimension attention module, a classification module, and a segmentation module. The segmentation module realized the point cloud segmentation function by Interpolate and Unit Pointnet network. The classification module implements the point cloud classification function through a point net layer Pointnet and a fully connected layer (FC). Ultimately, the status of the disconnector's operation is determined by analyzing the differences in the point cloud vectors of the conductive arm between successive frames.
Radio Frequency Fingerprint (RFF) identification is a non-password authentication technique, which have been researched in improving the security of the internet of Things (IoT) widely. For traditional access authenti...
详细信息
ISBN:
(纸本)9798350378412
Radio Frequency Fingerprint (RFF) identification is a non-password authentication technique, which have been researched in improving the security of the internet of Things (IoT) widely. For traditional access authentication technology, invaders can intercept or steal users' private information by impersonating their identities, which poses a great security risk. Therefore, the unique features of RFF have an important role in securing the network. However, existing methods for RFF identification in IoT systems may be ineffective in low signal-to-Noise Ratio (SNR) will result in mobile devices being unrecognized or misrecognized, leading to security vulnerabilities. Therefore, we propose an RFF identification scheme designed for a low SNR environment, using the Swin-Conv-UNet (SCUNet) for RFF identification. The effect of noise on RFF is reduced by denoising the Wigner-Ville Distribution (WVD) time-frequency images. In addition, we choose to conduct experiments on the WiFi signal (WiSig) Dataset with 10 different transmitters and the recognition of different devices is realized by ResNet18. The results show that the proposed method has significant improvement in the SNR range from -6 dB to 0 dB and achieves 91.5% accuracy at SNR = -4 dB.
Since the channel state information (CSI) can provide a fine-grained description of signal propagation process, in this paper, a new CSI fingerprint and graph convolutional network (GCN) based indoor localization algo...
详细信息
The proceedings contain 44 papers. The topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distan...
ISBN:
(纸本)9798350329599
The proceedings contain 44 papers. The topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distance monitoring, systems using YOLOv5;IMU-based human activity recognition using machine learning and deep learning models;enhancing brain tumor aid diagnosis with augmented reality rendering-based 6 DoF object pose estimation;secure key exchange scheme and blockchain-oriented data protection in the internet of vehicles;an intelligent edge-deployable indoor air quality monitoring and activity recognition approach;DiffT: a novel approach for privacy preserving data analytics;using data integration platform for effective location-aware service development platform;hybrid whale-mud-ring optimization for precise color skin cancer image segmentation;and an extensive evaluation of plant disease detection using diverse machine learning approaches.
The use of graphs as a method of storing data has begun to rise significantly in recent years, due to the new way of representing data in graphs. This is leveraged by the structure of graphs that facilitate modeling i...
详细信息
The use of graphs as a method of storing data has begun to rise significantly in recent years, due to the new way of representing data in graphs. This is leveraged by the structure of graphs that facilitate modeling interactions between real-world entities. With the rapid development of technologies such as machine learning and deep learning, the digitalization of education has entered the era with artificial intelligence as the main feature. As an important part of artificial intelligence technology, knowledge graph as a format of data storing provides possibilities for smart education and promotes the innovation and development of smart education. In this context, we present in this communication a model that we built to facilitate reaching the appropriate lesson for each learner among a large group of lessons in an eLearning graph, this model is practically divided into two parts, the first in which we sort the learners by defining the profile of each of them, which will facilitate their classification into groups, and in the second part, we connect each learner with his appropriate path to achieve the desired lesson, by building a nodal path through sequential prediction until reaching the target lesson, relying mainly on embedding graph models.
The internet of Medical Things in healthcare necessitates a secure way to transfer medical images due to the rise of telemedicine. Security breaches in public networks lead to falsification of medical images and furth...
详细信息
An era of automation is currently being experienced, where everything is becoming more automated day by day. Automation technology has been applied everywhere, from smaller to larger scales. Moreover, real-time commun...
详细信息
暂无评论