Detection of a staircase is an important task in the fields of both assistive technology and autonomous navigation with an aim to enable substantial improvement in safety and accessibility for both those with limited ...
详细信息
Metals are widely used in the manufacturing industry to manufacture a variety of products and it is important to visually inspect the end products. Companies incur financial losses and lose customer trust if defective...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
Terrain Aided Navigation(TAN)technology has become increasingly important due to its effectiveness in environments where Global Positioning System(GPS)is *** recent years,TAN systems have been extensively researched f...
详细信息
Terrain Aided Navigation(TAN)technology has become increasingly important due to its effectiveness in environments where Global Positioning System(GPS)is *** recent years,TAN systems have been extensively researched for both aerial and underwater navigation ***,many TAN systems that rely on recursive Unmanned Aerial Vehicle(UAV)position estimation methods,such as Extended Kalman Filters(EKF),often face challenges with divergence and instability,particularly in highly non-linear *** address these issues,this paper proposes and investigates a hybrid two-stage TAN positioning system for UAVs that utilizes Particle *** enhance the system’s robustness against uncertainties caused by noise and to estimate additional system states,a Fuzzy Particle Filter(FPF)is employed in the first *** approach introduces a novel terrain composite feature that enables a fuzzy expert system to analyze terrain non-linearities and dynamically adjust the number of particles in *** design allows the UAV to be efficiently localized in GPS-denied environments while also reducing the computational complexity of the particle filter in real-time *** the second stage,an Error State Kalman Filter(ESKF)is implemented to estimate the UAV’s *** ESKF is chosen over the conventional EKF method because it is more suitable for non-linear *** results demonstrate that the proposed fuzzy-based terrain composite method achieves high positional accuracy while reducing computational time and memory usage.
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study prop...
详细信息
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study proposes an edge task scheduling approach based on an improved Double Deep Q Network(DQN),which is adopted to separate the calculations of target Q values and the selection of the action in two networks.A new reward function is designed,and a control unit is added to the experience replay unit of the *** management of experience data are also modified to fully utilize its value and improve learning *** learning agents usually learn from an ignorant state,which is *** such,this study proposes a novel particle swarm optimization algorithm with an improved fitness function,which can generate optimal solutions for task *** optimized solutions are provided for the agent to pre-train network parameters to obtain a better cognition *** proposed algorithm is compared with six other methods in simulation *** show that the proposed algorithm outperforms other benchmark methods regarding makespan.
Image captioning has gained increasing attention in recent *** characteristics found in input images play a crucial role in generating high-quality *** studies have used visual attention mechanisms to dynamically focu...
详细信息
Image captioning has gained increasing attention in recent *** characteristics found in input images play a crucial role in generating high-quality *** studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption ***,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these ***,this leads to enhanced captioning network *** light of this,we present an image captioning framework that efficiently exploits the extracted representations of the *** framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language *** VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features ***,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative *** the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s *** the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve *** implementation code can be found here:https://***/althobhani/VFDICM(accessed on 30 July 2024).
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var...
详细信息
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability,underscoring the critical importance of robust cybersecurity *** paper advocates for leveraging machine learning(ML)to address variability management issues and fortify the security of *** the context of the broader special issue theme on innovative cybersecurity approaches,our proposed ML-based framework offers an interdisciplinary perspective,blending insights from computing,social sciences,and ***,it employs ML for demand analysis,dynamic feature extraction,and enhanced feature selection in distributed settings,contributing to cyber-resilient *** experiments demonstrate the framework’s superiority,emphasizing its potential to boost productivity and security in *** digital threats evolve,this research catalyzes interdisciplinary collaborations,aligning with the special issue’s goal of breaking down academic barriers to strengthen digital ecosystems against sophisticated attacks while upholding ethics,privacy,and human values.
The Arduino-controlled radar systems constituting the fundamental elements of this RADAR system, an ultrasonic sensor and servo motor are employed. The fundamental operation of the system is to detect objects within t...
详细信息
The discriminative correlation filter (DCF) is commonly utilized in UAV tracking because of its high tracking accuracy and computing speed. However, in aerial tracking scenarios, challenges such as target occlusion an...
详细信息
The discriminative correlation filter (DCF) is commonly utilized in UAV tracking because of its high tracking accuracy and computing speed. However, in aerial tracking scenarios, challenges such as target occlusion and similar object interference are likely to cause the predicted object position to deviate from the correct motion trajectory. To alleviate this issue, this paper proposes a correlation filter algorithm based on trajectory correction and context interference suppression for real-time aerial tracking. First, a tracking quality evaluation metric is proposed to determine the confidence of the current tracking results. When the object is in a low confidence status, the state matrices of the object position and velocity are constructed, and the Kalman filter strategy is utilized to correct the tracking trajectory automatically. In addition, temporal context-response regularization is designed to fully exploit previous temporal information in order to suppress background interference. Extensive experimental results on four mainstream datasets demonstrate that the proposed algorithm has high tracking performance while achieving a real-time tracking speed of 32 fps on a single CPU. IEEE
Crowds can lead up to severe disasterous consequences resulting in fatalities. Videos obtained through public cameras or captured by drones flying overhead can be processed with artificial intelligence-based crowd ana...
详细信息
暂无评论