In augmented reality, smart devices need to sense their own position in real physical space and complex scene structure to achieve good virtual reality interaction and three-dimensional registration. This paper propos...
详细信息
ISBN:
(纸本)9781728140773
In augmented reality, smart devices need to sense their own position in real physical space and complex scene structure to achieve good virtual reality interaction and three-dimensional registration. This paper proposes a technical framework of visual SLAM, which uses VO and BA methods based on feature points to obtain pose, and applies it to the augmented reality system to realize pose estimation, registration, tracking, collision and other effects of intelligent equipment independent of artificial or natural landmarks.
Recently, with the wide distribution of digital media, the need for authenticating digital images was increased. Therefore, many image tamper detection and recovery algorithms were introduced in literature to detect m...
Recently, with the wide distribution of digital media, the need for authenticating digital images was increased. Therefore, many image tamper detection and recovery algorithms were introduced in literature to detect malicious modifications and retrieve the original images. The process of detection and recovery, however, used to have complex operation which requires long processing time. In this paper, a simplified image recovery algorithm is presented by using lifting wavelet transform. In the proposed method, the approximation band is hidden inside the bits of the original image and to be retrieved without relying on source image. For images with hidden data, the average PSNR and SSIM values were 31.22 and 0.977 respectively, and images were successfully retrieved after block attack.
With the ubiquitous deployment of wireless systems and pervasive availability of smart devices, indoor localization is empowering numerous location-based services. With the established radio maps, WiFi fingerprinting ...
详细信息
ISBN:
(数字)9781728140346
ISBN:
(纸本)9781728140353
With the ubiquitous deployment of wireless systems and pervasive availability of smart devices, indoor localization is empowering numerous location-based services. With the established radio maps, WiFi fingerprinting has become one of the most practical approaches to localize mobile users. However, most fingerprint-based localization algorithms are computationintensive, with heavy dependence on both offline training phase and online localization phase. In this paper, we propose CNNLoc, a Convolutional Neural Network (CNN) based indoor localization system with WiFi fingerprints for multi-building and multifloor localization. Specifically, we devise a novel classification model by combining a Stacked Auto-Encoder (SAE) with a onedimensional CNN. The SAE is utilized to precisely extract key features from sparse Received Signal Strength (RSS) data while the CNN is trained to effectively achieve high success rates in the positioning phase. We evaluate the proposed system on the UJIIndoorLoc dataset and Tampere dataset with several stateof-the-art methods. The results show CNNLoc outperforms the existing solutions with 100% and 95% success rates on buildinglevel localization and floor-level localization, respectively.
This paper aims to improve the speed and complexity of Smith-Waterman (SW) algorithm. For this purpose, the SW algorithm was improved by reducing the complexity and task load of the computation of the scoring matrix w...
详细信息
Android malware has become a serious threat for our daily life, and thus there is a pressing need to effectively mitigate or defend against them. Recently, many approaches and tools to analyze Android malware have bee...
详细信息
Android malware has become a serious threat for our daily life, and thus there is a pressing need to effectively mitigate or defend against them. Recently, many approaches and tools to analyze Android malware have been proposed to protect legitimate users from the threat. However, most approaches focus on malware detection, while only a few of them consider malware classification or malware characterization. In this paper, we propose an extension of CDGDroid to classifying and characterizing Android malware families automatically. We first perform static analysis used in CDGDroid to extract control-flow graphs and data-flow graphs on the instruction level. Then we encode the graphs into matrices, and use them to build the family classification models via deep learning. For family characterization, we extract the n-gram sequences from the graphs, which are filtered according to the weights of the classification model built for the target family. And then we construct a vector space model and select the top-k sequences as a characterization of the target family. We have conducted some experiments to evaluate our approach and have identified that the family classification model taking the horizontal combination of CFG and DFG as features offers the best performance in terms of accuracy among all the models. Compared with CDGDroid, Drebin and many antivirus tools gathered in VirusTotal, our family classification model gives a better performance. Finally, We have also conducted experiments on family characterization, and the experimental results have shown that our characterization can capture the malicious behaviors of the testing families.
Predicting student retention is a crucial task for all stakeholders in higher education. This paper surveyed the Educational Data Mining (EDM) literature to explore the most recent methods used in building predictive ...
Predicting student retention is a crucial task for all stakeholders in higher education. This paper surveyed the Educational Data Mining (EDM) literature to explore the most recent methods used in building predictive models to predict student's retention, and to foresee the future trends in different context of higher education. We review a diversified set of approaches, models, data sets, tools, techniques, and performance measures. The approaches vary as the educational context varies where opportunities and challenges are associated with each approach. We also present a discussion and a foresight of future directions.
In order to efficiently reduce computational expense as well as manage the diversity and convergence in many-objective optimization, this paper proposes a novel multi-indicator bacterial foraging algorithm with Krigin...
详细信息
Natural images always exhibit a certain nonlocal self-similarity property, which implies that the patch matrix formed by similar image patches is low-rank. In this paper, the self-similarity of images is combined with...
详细信息
Despite the devastating effects of floods, the concept of resilience is still not fully considered in the assessment and management of flood risk. To study how resilience can lower the risk of floods and further enhan...
详细信息
Despite the devastating effects of floods, the concept of resilience is still not fully considered in the assessment and management of flood risk. To study how resilience can lower the risk of floods and further enhance disaster response, this research aims to close this knowledge gap. With a focus on the Kashkan watershed in Iran, the study combines the extended catastrophe progression method with the pressure-state-response model. Three catastrophe models, namely the cusp, swallowtail, and butterfly, are applied. According to the findings, southern regions, i.e., Pol-Dokhtar city, have the highest risk of floods and the lowest resilience. Resilience and flood risk have a complementary relationship, according to the analysis, and resilience is a helpful metric for risk assessment. The results emphasize the necessity to incorporate resilience-focused pre-disruption planning and post-disaster recovery into flood risk management strategy. This work offers a foundation to incorporate resilience into future flood policies and strategies.
—Convolutional Neural Networks (CNNs) have emerged as a powerful strategy for most object detection tasks on 2D images. However, their power has not been fully realised for detecting 3D objects in point clouds direct...
详细信息
暂无评论