Traditional autonomous navigation methods for mobile robots mainly rely on geometric feature-based LiDAR scan-matching algorithms, but in complex environments, this method is often affected due to the presence of movi...
详细信息
Image processing,agricultural production,andfield monitoring are essential studies in the researchfi*** diseases have an impact on agricultural production and *** disease detection at a preliminary phase reduces economi...
详细信息
Image processing,agricultural production,andfield monitoring are essential studies in the researchfi*** diseases have an impact on agricultural production and *** disease detection at a preliminary phase reduces economic losses and improves the quality of *** identifying the agricultural pests is usually evident in plants;also,it takes more time and is an expensive technique.A drone system has been developed to gather photographs over enormous regions such as farm areas and *** atmosphere generates vast amounts of data as it is monitored closely;the evaluation of this big data would increase the production of agricultural *** paper aims to identify pests in mango trees such as hoppers,mealybugs,inflorescence midges,fruitflies,and stem *** of the massive volumes of large-scale high-dimensional big data collected,it is necessary to reduce the dimensionality of the input for classify-ing *** community-based cumulative algorithm was used to classify the pests in the existing *** proposed method uses the Entropy-ELM method with Whale Optimization to improve the classification in detecting pests in *** Entropy-ELM method with the Whale Optimization Algorithm(WOA)is used for feature selection,enhancing mango pests’classification *** Vector Machines(SVMs)are especially effective for classifying while users get var-ious classes in which they are *** are created as suitable classifiers to categorize any dataset in Big Data *** proposed Entropy-ELM-WOA is more capable compared to the existing systems.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherin...
详细信息
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherings,which may influence the decrease in the number of *** urges a reliable,flexible,transparent,secure,and cost-effective voting *** proposed online voting system using cloud-based hybrid blockchain technology eradicates the flaws that persist in the existing voting system,and it is carried out in three phases:the registration phase,vote casting phase and vote counting phase.A timestamp-based authentication protocol with digital signature validates voters and candidates during the registration and vote casting *** smart contracts,third-party interventions are eliminated,and the transactions are secured in the blockchain ***,to provide accurate voting results,the practical Byzantine fault tolerance(PBFT)consensus mechanism is adopted to ensure that the vote has not been modified or ***,the overall performance of the proposed system is significantly better than that of the existing *** performance was analyzed based on authentication delay,vote alteration,response time,and latency.
Brain tumors are one of the deadliest diseases and require quick and accurate methods of detection. Finding the optimum image for research goals is the first step in optimizing MRI images for pre- and post-processing....
详细信息
Background: Proteins act as clotting factors to stop bleeding at the lesion site. This implies that people with hemophilia tend to bleed longer after an injury and are more prone to internal bleeding. Depending on the...
详细信息
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st...
详细信息
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicin...
详细信息
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicing of services, and place network functions generated by heterogeneous devices into available *** is a combinatorial optimization problem that is solved by developing a Particle Swarm Optimization (PSO)based scheduling strategy with enhanced inertia weight, particle variation, and nonlinear learning factor, therebybalancing the local and global solutions and improving the convergence speed to globally near-optimal *** show that the method improves the convergence speed and the utilization of network resourcescompared with other variants of PSO.
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical *** to the inevitable noise during the pho...
详细信息
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical *** to the inevitable noise during the photoelectric detection and analog-digital conversion,the varying of output optical power would change the signal to noise ratio,then impact time delay signature identification and the random bit *** results show that,when the optical power is less than-14 dBm,with the decreasing of the optical power,the actual identified time delay signature degrades and the entropy of the chaotic signal ***,the extracted random bit sequence with lower optical power is more easily pass through the randomness testing.
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant c...
详细信息
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant challenges to information *** techniques embed hidden information into speech streams,making detection increasingly difficult,particularly under conditions of low embedding rates and short speech *** steganalysis methods often struggle to balance detection accuracy and computational efficiency due to their limited ability to effectively capture both temporal and spatial features of speech *** address these challenges,this paper proposes an Efficient Sliding Window Analysis Network(E-SWAN),a novel deep learning model specifically designed for real-time speech steganalysis.E-SWAN integrates two core modules:the LSTM Temporal Feature Miner(LTFM)and the Convolutional Key Feature Miner(CKFM).LTFM captures long-range temporal dependencies using Long Short-Term Memory networks,while CKFM identifies local spatial variations caused by steganographic embedding through convolutional *** modules operate within a sliding window framework,enabling efficient extraction of temporal and spatial *** results on the Chinese CNV and PMS datasets demonstrate the superior performance of *** conditions of a ten-second sample duration and an embedding rate of 10%,E-SWAN achieves a detection accuracy of 62.09%on the PMS dataset,surpassing existing methods by 4.57%,and an accuracy of 82.28%on the CNV dataset,outperforming state-of-the-art methods by 7.29%.These findings validate the robustness and efficiency of E-SWAN under low embedding rates and short durations,offering a promising solution for real-time VoIP *** work provides significant contributions to enhancing information security in digital communications.
暂无评论