In the last few years, numerous applications of wireless sensor networks that make use of a variety of data transfer protocols have been created in the commercial and industrial sectors. Because the sensor nodes have ...
详细信息
Internet of Things (IoT) systems and Artificial Intelligence of Things (AIoT) systems are applied in wide range nowadays. This paper proposes developing adaptive devices for AIoT systems. The adaptive devices include ...
详细信息
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ...
详细信息
ISBN:
(数字)9798331515966
ISBN:
(纸本)9798331515973
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful capabilities in extracting local information but facing challenges in capturing global features. Transformers can address this limitation, but they perform poorly in extracting local features and significantly increase memory requirements and computational complexity. To overcome these challenges, we propose a method for building extraction from remote sensing images called LGDB-Net (Local-Global Dual-Branch Network), employing a dual-branch approach. Firstly, inspired by Swin Transformer, we designed GB-Former(Global Branch-Former) as the backbone network to model global information. We use a linear multi-head self-attention mechanism to reduce time and memory complexity while maintaining a large global receptive field. Additionally, we replace the traditional multi-layer perceptron with a convolution-enhanced multi-layer perceptron to improve channel feature representation, reduce model parameters, and enhance segmentation performance. Secondly, we use multiple Depth-wise Conv3×3 + LN (Layer Normalization) + GeLU (Gaussian Error Linear Unit) modules as the auxiliary branch for local detailed feature extraction. Finally, we adopt a multi-scale feature fusion strategy to integrate feature information from both branches. We conduct a series of experiments on three datasets: WHU, Massachusetts, and Inria. The experimental results demonstrate that the proposed method not only effectively improves segmentation accuracy with lower building omission and commission rates but also significantly reduces model parameters and computational complexity.
Blockchain (BC) systems mainly depend on the consistent state of the distributed Ledger (DL) at different logical and physical places of the network. The majority of network nodes need to be enforced to use one or bot...
详细信息
Blockchain (BC) systems mainly depend on the consistent state of the distributed Ledger (DL) at different logical and physical places of the network. The majority of network nodes need to be enforced to use one or both of the following approaches to remain consistent: (i) to wait for certain delays (i.e. by requesting a hard puzzle solution as in PoW and PoUW, or to wait for random delays as in PoET, etc.) (ii) to propagate shared data through shortest possible paths within the network. The first approach may cause higher energy consumption and/or lower throughput rates if not optimized, and in many cases these features are conventionally fixed. Therefore, it is preferred to enhance the second approach with some optimization. Previous works for this approach have the following drawbacks: they may violate the identity privacy of miners, only locally optimize the Neighbor Selection method (NS), do not consider the dynamicity of the network, or require the nodes to know the precise size of the network at all times. In this paper, we address these issues by proposing a Dynamic and Optimized NS protocol called DONS, using a novel privacy-aware leader election within the public BC called AnoLE, where the leader anonymously solves the The Minimum Spanning Tree problem (MST) of the network in polynomial time. Consequently, miners are informed about the optimum NS according to the current state of network topology. We analytically evaluate the complexity, the security and the privacy of the proposed protocols against state-of-the-art MST solutions for DLs and well known attacks. Additionally, we experimentally show that the proposed protocols outperform state-of-the-art NS solutions for public BCs. Our evaluation shows that the proposed DONS and AnoLE protocols are secure, private, and they acutely outperform all current NS solutions in terms of block finality and fidelity. (C) 2021 The Author(s). Published by Elsevier B.V.
With the rapid development of VAV technology and the Internet of Things (IoT), the application of VAVs in emergency scenarios has become a research hotspot. In emergency situations, how to efficiently plan UAV flight ...
详细信息
ISBN:
(数字)9798331518677
ISBN:
(纸本)9798331518684
With the rapid development of VAV technology and the Internet of Things (IoT), the application of VAVs in emergency scenarios has become a research hotspot. In emergency situations, how to efficiently plan UAV flight paths to assist in collecting data from ground sensors has become a key issue to ensure a swift re-sponse to emergency actions. Traditional path planning methods often fail to adapt to complex and dynamic emergency environments. Therefore, based on the Deep Deterministic Policy Gradient (DDPG) algorithm, we introduce a Prioritized Experience Re-play (PER) network to improve learning efficiency, and propose a novel end-to-end reinforcement learning (RL) UAV path planning algorithm for data collection from IoT devices in emergency sce-narios.
Permutation is a fundamental way of data augmentation. However, it is not commonly used in image based systems with hardware acceleration due to distortion of spatial correlation and generation complexity. This paper ...
详细信息
ISBN:
(数字)9783031199837
ISBN:
(纸本)9783031199820;9783031199837
Permutation is a fundamental way of data augmentation. However, it is not commonly used in image based systems with hardware acceleration due to distortion of spatial correlation and generation complexity. This paper proposes Restricted Permutation Network (RPN), a scalable architecture to automatically generate a restricted subset of local permutation, preserving the features of the dataset while simplifying the generation to improve scalability. RPN reduces the spatial complexity from O(Nlog(N)) to O(N), making it easily scalable to 64 inputs and beyond, with 21 times speed up in generation and significantly reducing data storage and transfer, while maintaining the same level of accuracy as the original dataset for deep learning training. Experiments show Convolutional Neural networks (CNNs) trained by the augmented dataset can be as accurate as the original one. Combining three to five networks in general improves the network accuracy by 5%. Network training can be accelerated by training multiple sub-networks in parallel with a reduced training data set and epochs, resulting in up to 5 times speed up with a negligible loss in accuracy. This opens up the opportunity to easily split long iterative training process into independent parallelizable processes, facilitating the trade off between resources and run time.
Security is a major concern for vehicular ad hoc networks (VANETs). Group-based communications in VANETs is a commonly investigated topic. Creating a group and distributing a key to numerous fast-moving vehicles for s...
Blockchain applications require metadata to be associated with the blockchain ledger. Metadata is often stored in centralized cloud servers, which limits the decentralization of the blockchain. Alternatively, metadata...
Blockchain applications require metadata to be associated with the blockchain ledger. Metadata is often stored in centralized cloud servers, which limits the decentralization of the blockchain. Alternatively, metadata can be integrated into distributed storage systems to achieve full decentralization of blockchain networks. However, evaluating the performance of distributed storage systems is often neglected. To address this gap, we present a framework that includes a set of technical indicators. We specifically focus on the InterPlanetary File System (IPFS) as an illustrative distributed storage system and provide a practical use case to demonstrate the application of our framework.
Early anomaly detection in automotive systems is crucial for enhancing user safety and enabling timely corrective actions, thereby minimizing the risks associated with system malfunctions. This paper presents an appro...
详细信息
ISBN:
(数字)9798331524937
ISBN:
(纸本)9798331524944
Early anomaly detection in automotive systems is crucial for enhancing user safety and enabling timely corrective actions, thereby minimizing the risks associated with system malfunctions. This paper presents an approach for implementing Artificial Intelligence (AI)-based algorithms for anomaly detection in the automotive domain, leveraging the RISC-V architecture in conjunction with Domain-Specific Accelerators (DSAs). By exploiting the efficiency of DSAs, the proposed system aims to achieve faster anomaly detection compared to traditional processing methods. A detailed comparison is conducted between the performance of executing the AI-based anomaly detection algorithm on the RISC-V core versus offloading it to an optimized hardware accelerator tailored to the specific AI model. The goal of this work is to provide valuable insights into the potential of RISCV and DSAs to enhance AI-driven safety mechanisms, contributing to the development of more reliable automotive systems.
Individual safety in urban and city centers is one of the fundamental rights of every person. Today's innovations open up various possibilities for improving the quality of life and safety, but if they are not app...
详细信息
ISBN:
(数字)9798350385601
ISBN:
(纸本)9798350385618
Individual safety in urban and city centers is one of the fundamental rights of every person. Today's innovations open up various possibilities for improving the quality of life and safety, but if they are not applied, they carry the danger of an additional increase in crime or greater insecurity in urban centers. This investigation aims to apply insights into the anticipation of illegal actions by various criminal groups that use illegal means, such as weapons, to get property that does not belong to them. In this research, computer vision and advanced strategies such as YOLOv10 and YOLOv9 are used to compare their properties and performance for improving security in urban and populated areas. The best results were achieved by YOLOv9m with a high percentage of mean average precision in the amount of 0.923, while the worst performance was shown by YOLOv10n with a mean average precision of 0.902. Precision and recall for the YOLOv9 and YOLOv10 models were also taken into account and the results are as follows: 0.984.. 0.993.. 0.979.. and 0.996.
暂无评论