Potato blackleg is a tuber-borne bacterial disease caused by species within the genera Dickeya and Pectobacterium that can cause decay of plant tissue and wilting through the action of cell wall degrading enzymes rele...
详细信息
Potato blackleg is a tuber-borne bacterial disease caused by species within the genera Dickeya and Pectobacterium that can cause decay of plant tissue and wilting through the action of cell wall degrading enzymes released by the pathogen. In case of serious infections, tubers may rot before emergence. Management is largely based on the use of pathogen-free seed potato tubers. For this, fields are visually monitored both for certification and also to take out diseased plants to avoid spread to neighboring plants. Imaging potentially offers a quick and non-destructive way to inspect the health of potato plants in a field. Early detection of blackleg diseased plants with modern vision techniques can significantly reduce costs. In this paper, we studied the use of deep learning for detecting blackleg diseased potato plants. Two deep convolutional neural networks were trained on RGB images with healthy and diseased plants. One of these networks (ResNetl8) was experimentally found to produce a precision of 95 % and recall of 91 % for the disease class. These results show that convolutional neural networks can be used to detect blackleg diseased potato plants. (C) 2019, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
In Distributed Database System (DBS) and multitasking system, the occurrence of deadlocks is one of the most serious problems. If a site request for a resource that is already in the another site which is waiting for ...
详细信息
ISBN:
(数字)9781665419604
ISBN:
(纸本)9781665429986
In Distributed Database System (DBS) and multitasking system, the occurrence of deadlocks is one of the most serious problems. If a site request for a resource that is already in the another site which is waiting for another resource then the scenario is called as distributed deadlock. Different distributed environments require a suitable deadlock detection algorithm to detect deadlocks. Different distributed environments needs to maintain their platforms by avoiding deadlocks. To achieve this environment, it is required to fed with optimized deadlock detection and avoidance algorithms. In this article, different deadlock detection algorithms that uses Wait For Graph and resolution algorithms to trace out deadlocks were discussed. An optimization technique is used for resolving deadlock in an efficient manner. A comparison between different deadlock detection algorithms based on different parameters like, delay time, message size, number of messages and whether the algorithm detects false deadlocks or not were performed. Based on the comparisons, a few deadlock detection algorithms were suggested for the distributed environment.
The processing framework resorting to the constant false alarm rate (CFAR) feature plane interprets CFAR detector design as a learning machine composed of input layer, hidden layer (invariant feature extraction), desi...
详细信息
ISBN:
(纸本)9781665468893
The processing framework resorting to the constant false alarm rate (CFAR) feature plane interprets CFAR detector design as a learning machine composed of input layer, hidden layer (invariant feature extraction), design layer and output layer, which provides a novel way to the design of CFAR detector. In this paper, we investigate the design criterion to the design layer under this framework. On the CFAR feature plane composed of two maximum invariant statistics, two new detectors with simple controllable parameters are designed through feature fusion by weighted arithmetic mean and weighted geometric mean. Finally, simulation experiments verify the effectiveness of the two methods.
Antivirus software is considered to be the primary line of defense against malicious software in modern computing systems. The purpose of this paper is to expose exploitation that can evade Antivirus software that use...
详细信息
Antivirus software is considered to be the primary line of defense against malicious software in modern computing systems. The purpose of this paper is to expose exploitation that can evade Antivirus software that uses signature-based detection algorithms. In this paper, a novel approach was proposed to change the source code of a common Metasploit-Framework used to compile the reverse shell payload without altering its functionality but changing its signature. The proposed method introduced an additional stage to the shellcode program. Instead of the shellcode being generated and stored within the program, it was generated separately and stored on a remote server and then only accessed when the program is executed. This approach was able to reduce its detectability by the Antivirus software by 97% compared to a typical reverse shell program.
Vehicle automatic driving technology can effectively improve the safety performance of vehicle driving. This research is to meet the needs of vehicle automatic driving, and propose a target recognition algorithm with ...
详细信息
ISBN:
(纸本)9781665426312
Vehicle automatic driving technology can effectively improve the safety performance of vehicle driving. This research is to meet the needs of vehicle automatic driving, and propose a target recognition algorithm with better performance. According to the existing research, the algorithm is optimized and improved based on the traditional Faster R-CNN algorithm, and a network target recognition algorithm based on Multi Strategy Regional candidate box is proposed to optimize the anchor box. Through the comparative analysis of recognition and recall rate between traditional R-CNN algorithm and MSPRN algorithm, it can be seen that MSPRN algorithm has better algorithm performance and is suitable for target detection and recognition in vehicle automatic driving.
Although the academia has done a lot of research on DNS abnormal behavior, whether from the perspective of traffic or irregular domain name recognition, the mechanism behind DNS is ignored in the pre-processing of DNS...
详细信息
ISBN:
(纸本)9781665405836
Although the academia has done a lot of research on DNS abnormal behavior, whether from the perspective of traffic or irregular domain name recognition, the mechanism behind DNS is ignored in the pre-processing of DNS logs and other data. In addition, most studies focus on traffic anomaly detection and unconventional domain name recognition, and lack of systematic research on the combination of the two, so the proposed algorithm has no practical application. This paper proposes a clustering method based on DNS client IP address traffic characteristics, which divides DNS logs into five access modes. Then, a DNS log preprocessing algorithm is designed to preprocess the logs that may exist in zombie hosts. Finally, a two-layer GRU network detection algorithm based on domain name text features is proposed. Experimental results show that this method can effectively identify zombie hosts in DNS logs.
As an automation approach of the Old Newspaper digitization, the content segmentation plays a major role. This study segments the degraded and mediocre quality old Sinhala newspapers into separate articles together wi...
详细信息
ISBN:
(数字)9781665483254
ISBN:
(纸本)9781665483261
As an automation approach of the Old Newspaper digitization, the content segmentation plays a major role. This study segments the degraded and mediocre quality old Sinhala newspapers into separate articles together with main elements classification, character segmentation, feature extraction, and character recognition. As a remedial measure for the misspelled word generation, a word correction technique was introduced at the end of the process to improve the accuracy of the article digitization. This paper highlights the first step of this study, where newspaper page segmentation into separate articles through heuristic knowledge embedded approach is carried out. This approach includes image detection, line detection, text area identification, margin detection, and column separation of newspaper pages. The results of this research are intriguingly comparable to other existing literature.
In recent years, the steganography scheme based on neural network has made many significant progress on images, but it is still in the exploratory stage in the field of video steganography. By using long skip connecti...
详细信息
ISBN:
(纸本)9781665406314
In recent years, the steganography scheme based on neural network has made many significant progress on images, but it is still in the exploratory stage in the field of video steganography. By using long skip connections to extract the spatio-temporal information in the video, this paper proposes a 3DCNN full-video steganography network. The network takes a pair of cover and secret video sequences as input, and uses a stego network to output a spatio-temporal residual sequence, which is added to the cover video as a small disturbance. A video classification network is proposed, which can be used to identify the cover video frame and the stego video frame to assist the message receiver to extract the secret message correctly. We chose UCF101 video data set as the training and testing set of the network model. We used various video quality evaluation indicators (PSNR, SSIM, Pixel distribution) to measure the performance evaluation of the stego video network, and proved the anti-detection of the stego video by using some stego detection algorithms. Under the training and testing of the data set of stego videos generated by the stego network, the classification accuracy of the proposed video classification network reaches about 93%.
With the continuous improvement of physical education reform, attention should be paid to the evaluation of students' satisfaction with the quality of physical education and the establishment of a physical educati...
详细信息
With the continuous improvement of physical education reform, attention should be paid to the evaluation of students' satisfaction with the quality of physical education and the establishment of a physical education quality evaluation system. This paper relies on the detection algorithm of emergent words, adopts the method of investigation and analysis, obtains the four main factors that affect the evaluation results of the classroom teaching quality of college physical education teachers, and conducts impact analysis, aiming to provide a reference for the evaluation of college physical education quality.
Loop closing is a crucial step to improve the accuracy of a SLAM system, which can reduce drift caused by frontend odometry and ensure global consistency of mapping process. In a traditional visual SLAM system, this i...
详细信息
ISBN:
(纸本)9781665408486
Loop closing is a crucial step to improve the accuracy of a SLAM system, which can reduce drift caused by frontend odometry and ensure global consistency of mapping process. In a traditional visual SLAM system, this is usually done by extracting and matching image features. The accuracy of the loop closure detection and the precision of the pose-constraint provided by loop closing is the bottleneck restricting the loop closing accuracy. Since image features is sensitive to large viewpoint changes, in this paper, we propose a novel neural network architecture VPD-Map, which takes visual pointcloud to provide a global 3D visual descriptor for fast loop closure detection and a top-view feature map for pose-constraint prior. Since the descriptor and feature map are based solely on visual pointcloud information, it is robust to viewpoint changes. VPD-Map can also serve as the backend of a visualSLAM system. Experiment on loop closure detection shows that this descriptor can perform viewpoint-free loop closure detection and outperforms traditional loop detection algorithms like bag-of-word model on the KITTI Odometry Dataset.
暂无评论