Knowledge distillation (KD) compresses the network capacity by transferring knowledge from a large (teacher) network to a smaller one (student). It has been mainstream that the teacher directly transfers knowledge to ...
详细信息
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy...
详细信息
Perovskite solar cells represent a revolutionary class of photovoltaic devices that have gained substantial attention for their exceptional performance and potential to provide an affordable and efficient solution for...
详细信息
Perovskite solar cells represent a revolutionary class of photovoltaic devices that have gained substantial attention for their exceptional performance and potential to provide an affordable and efficient solution for harnessing solar energy. These cells utilize perovskite-structured materials, typically hybrid organicinorganic lead halide compounds, as the light-absorbing layer.
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of evidence than still photographs. Due to the tremendous growth of video editing tools, anyone with access to advanced editing software and a modern Smartphone can easily do digital video manipulations and fake it. As a result, to utilize video content as proof in court, it is necessary to evaluate and determine whether it is original or modified. To check the integrity and validity of video recordings, digital forgery detection techniques are required. The objective of the study is to present a systematic review of techniques for detecting forgery in digital videos. We conducted a systematic literature review (SLR) in this study to present a detailed review of the initial and recent research efforts in Digital video forgery detection, summarizing 260 relevant papers from 2000 to 2023 that have presented a variety of techniques. For analysis, we have presented our references in three different ways: according to the type of forgery detected, according to the type of model or technique used and according to the feature used for forgery detection. We look through the several datasets that are cited in articles and determine their applicable domain. Then, we looked at the numerous measuring metrics employed by different research papers and compared the effectiveness of deep and non-deep models in each category of forgery that was found. Finally, research gaps concerning passive video forgery detection are classified and highlighted. A comparison between our survey and other existing survey articles has been presented in the paper. Researchers who wish to work on video forgery detection will get assistance to determine what kind of efforts in forgery detection work is still required. This survey will also help to select techniques and features based on their
In this paper, we present a multi-agent deep reinforcement learning (deep RL) framework for network slicing in a dynamic environment with multiple base stations and multiple users. In particular, we propose a novel de...
详细信息
Automatic Speech Recognition (ASR) has been the regnant research area in the domain of Natural Language Processing for the last few decades. Past years’ advancement provides progress in this area of research. The acc...
详细信息
Unmanned aerial vehicles(UAVs)are widely used in situations with uncertain and risky areas lacking network *** natural disasters,timely delivery of first aid supplies is *** UAVs face risks such as crashing into birds...
详细信息
Unmanned aerial vehicles(UAVs)are widely used in situations with uncertain and risky areas lacking network *** natural disasters,timely delivery of first aid supplies is *** UAVs face risks such as crashing into birds or unexpected *** systems with parachutes risk dispersing payloads away from target *** objective here is to use multiple UAVs to distribute payloads cooperatively to assigned *** civil defense department must balance coverage,accurate landing,and flight safety while considering battery power and *** Q-network(DQN)models are commonly used in multi-UAV path planning to effectively represent the surroundings and action *** strategies focused on advanced DQNs for UAV path planning in different configurations,but rarely addressed non-cooperative scenarios and disaster *** paper introduces a new DQN framework to tackle challenges in disaster *** considers unforeseen structures and birds that could cause UAV crashes and assumes urgent landing zones and winch-based airdrop systems for precise delivery and return.A new DQN model is developed,which incorporates the battery life,safe flying distance between UAVs,and remaining delivery points to encode surrounding hazards into the state space and ***,a unique reward system is created to improve UAV action sequences for better delivery coverage and safe *** experimental results demonstrate that multi-UAV first aid delivery in disaster environments can achieve advanced performance.
In the digital age, the agricultural industry faces unique challenges, including the efficient management and maintenance of farm vehicles and tools. This paper introduces a blockchain-based agricultural vehicle and t...
详细信息
Multi-user Augmented Reality (MuAR) allows multiple users to interact with shared virtual objects, facilitated by exchanging environment information. Current MuAR systems rely on 3D point clouds for real-world analysi...
详细信息
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for rel...
详细信息
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for reliable operations on the roads and connected vehicles in ITS. Despite the immense potential of Big Data intelligence in ITS, autonomous vehicles are largely confined to testing and trial phases. The research community is working tirelessly to improve the reliability of ITS by designing new protocols, standards, and connectivity paradigms. In the recent past, several surveys have been conducted that focus on Big Data Intelligence for ITS, yet none of them have comprehensively addressed the fundamental challenges hindering the widespread adoption of autonomous vehicles on the roads. Our survey aims to help readers better understand the technological advancements by delving deep into Big Data architecture, focusing on data acquisition, data storage, and data visualization. We reviewed sensory and non-sensory platforms for data acquisition, data storage repositories for archival and retrieval of large datasets, and data visualization for presenting the processed data in an interactive and comprehensible format. To this end, we discussed the current research progress by comprehensively covering the literature and highlighting challenges that urgently require the attention of the research community. Based on the concluding remarks, we argued that these challenges hinder the widespread presence of autonomous vehicles on the roads. Understanding these challenges is important for a more informed discussion on the future of self-driven technology. Moreover, we acknowledge that these challenges not only affect individual layers but also impact the functionality of subsequent layers. Finally, we outline our future work that explores how resolving these challenges could enable the realization of innovations such as smart charging systems on the roads and data centers
暂无评论