This article used finite element (FE) analysis to study and analyze the electrical conductivity profile of simulated stroke patients based on a 45 dB signal-to-noise ratio synthesized measurement. Clinical measurement...
详细信息
With the recent increase in the number of Internet of things(IoT) services, an intelligent scheduling strategy is needed to manage these services. In this paper, the problem of automatic choreography of microservices ...
详细信息
With the recent increase in the number of Internet of things(IoT) services, an intelligent scheduling strategy is needed to manage these services. In this paper, the problem of automatic choreography of microservices in IoT is explored. A type of reinforcement learning(RL) algorithm called TD3 is used to generate the optimal choreography policy under the framework of a softwaredefined network. The optimal policy is gradually reached during the learning procedure to achieve the goal, despite the dynamic characteristics of the network environment. The simulation results show that compared with other methods, the TD3 algorithm converges faster after a certain number of iterations, and it performs better than other non-RL algorithms by obtaining the highest reward. The TD3 algorithm can effciently adjust the traffic transmission path and provide qualified IoT services.
Pine wood nematode infection is a devastating *** aerial vehicle(UAV)remote sensing enables timely and precise ***,UAV aerial images are challenged by small target size and complex sur-face backgrounds which hinder th...
详细信息
Pine wood nematode infection is a devastating *** aerial vehicle(UAV)remote sensing enables timely and precise ***,UAV aerial images are challenged by small target size and complex sur-face backgrounds which hinder their effectiveness in *** address these challenges,based on the analysis and optimization of UAV remote sensing images,this study developed a spatio-temporal multi-scale fusion algorithm for disease *** multi-head,self-attention mechanism is incorporated to address the issue of excessive features generated by complex surface backgrounds in UAV *** enables adaptive feature control to suppress redundant information and boost the model’s feature extraction *** SPD-Conv module was introduced to address the problem of loss of small target feature information dur-ing feature extraction,enhancing the preservation of key ***,the gather-and-distribute mechanism was implemented to augment the model’s multi-scale feature fusion capacity,preventing the loss of local details during fusion and enriching small target feature *** study established a dataset of pine wood nematode disease in the Huangshan area using DJI(DJ-Innovations)*** results show that the accuracy of the proposed model with spatio-temporal multi-scale fusion reached 78.5%,6.6%higher than that of the benchmark *** upon the timeliness and flexibility of UAV remote sensing,the pro-posed model effectively addressed the challenges of detect-ing small and medium-size targets in complex backgrounds,thereby enhancing the detection efficiency for pine wood nematode *** facilitates early preemptive preser-vation of diseased trees,augments the overall monitoring proficiency of pine wood nematode diseases,and supplies technical aid for proficient monitoring.
Dear Editor,Tracking control in networked environment is a very challenging problem due to the contradiction of rapid response to the time-varying signal and the inevitable delay introduced by networks. This letter ha...
详细信息
Dear Editor,Tracking control in networked environment is a very challenging problem due to the contradiction of rapid response to the time-varying signal and the inevitable delay introduced by networks. This letter has proposed several fuzzy-inverse-model-based network tracking control frameworks which are helpful in handling the system with nonlinear dynamics and uncertainties.
Lidar and visual data are affected heavily in adverse weather conditions due to sensing mechanisms,which bring potential safety hazards for vehicle *** sensing is desirable to build a more robust navigation *** this p...
详细信息
Lidar and visual data are affected heavily in adverse weather conditions due to sensing mechanisms,which bring potential safety hazards for vehicle *** sensing is desirable to build a more robust navigation *** this paper,a cross-modality radar localisation on prior lidar maps is ***,the proposed workflow consists of two parts:first,bird's-eye-view radar images are transferred to fake lidar images by training a generative adversarial network *** with online radar scans,a Monte Carlo localisation framework is built to track the robot pose on lidar *** whole online localisation system only needs a rotating radar sensor and a pre-built global lidar *** the experimental section,the authors conduct an ablation study on image settings and test the proposed system on Oxford Radar Robot Car *** promising results show that the proposed localisation system could track the robot pose successfully,thus demonstrating the feasibility of radar style transfer for metric robot localisation on lidar maps.
Semantic segmentation of high-resolution traffic scene images is a challenging task due to complex backgrounds, diverse object shapes, similar appearances of multiple objects, and multi-scale characteristics of the sa...
详细信息
Based on the substation outdoor box cabinet in the operation process, which is prone to condensation and overheating, this paper designs a temperature and humidity control device for outdoor box cabinet of substation ...
详细信息
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-ga...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequent identification presents a formidable *** existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets,with the dataset’s imbalance significantly affecting the model’s *** the present study,a new model,referred to as UD-VLD(Unbalanced Dataset-VAE-LSTM-DRN),was proposed to address above *** proposed model is an encrypted traffic identification model for handling unbalanced *** encoder of the variational autoencoder(VAE)is combined with the decoder and Long-short term Memory(LSTM)in UD-VLD model to realize the data enhancement processing of the original unbalanced *** enhanced data is processed by transforming the deep residual network(DRN)to address neural network gradient-related ***,the data is classified and *** UD-VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique,thereby solving the processing problem for unbalanced *** UD-VLD model was tested using the publicly available Tor dataset and VPN *** UD-VLD model is evaluated against other comparative models in terms of accuracy,loss rate,precision,recall,F1-score,total time,and ROC *** results reveal that the UD-VLD model exhibits better performance in both binary and multi classification,being higher than other encrypted traffic recognition models that exist for unbalanced ***,the evaluation performance indicates that the UD-VLD model effectivelymitigates the impact of unbalanced data on traffic *** can serve as a novel solution for encrypted traffic identification.
Industrial network control systems (INCSs) are easy to be targeted by attackers due to their high economic value. Most of the existing defense methods are deployed at the network boundary, which causes high-security r...
详细信息
暂无评论