This Letter proposes an improved Camshift algorithm based on the efficient channel attention (ECA)-ResNet model for laser spot tracking in underwater optical wireless communication (UOWC) systems. Experimental results...
详细信息
Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster *** this study,we investigated the post-disaster rescue path planning problem and m...
详细信息
Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster *** this study,we investigated the post-disaster rescue path planning problem and modeled this problem as a variant of the travel salesman problem(TSP)with life-strength *** address this problem,we proposed an improved iterated greedy(IIG)***,a push-forward insertion heuristic(PFIH)strategy was employed to generate a high-quality initial ***,a greedy-based insertion strategy was designed and used in the destruction-construction stage to increase the algorithm’s exploration ***,three problem-specific swap operators were developed to improve the algorithm’s exploitation ***,an improved simulated annealing(SA)strategy was used as an acceptance criterion to effectively prevent the algorithm from falling into local *** verify the effectiveness of the proposed algorithm,the Solomon dataset was extended to generate 27 instances for ***,the proposed IIG was compared with five state-of-the-art *** parameter analysiswas conducted using the design of experiments(DOE)Taguchi method,and the effectiveness analysis of each component has been verified one by *** results indicate that IIGoutperforms the compared algorithms in terms of the number of rescue survivors and convergence speed,proving the effectiveness of the proposed algorithm.
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
Cryptanalytic innovations are considered the most economical and useful method for guaranteeing information security across shared networks. Despite the tinier key magnitude of Elliptic Curve Cryptography (ECC) compar...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) ...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) fully discrete scheme with unconditional energy stability. Spatially the FEM is adopted, using a triangular mesh discretization strategy that can be adapted to complex regions. Temporally, the EIEQ approach is considered, which not only linearizes the nonlinear potential but also gives a new variable that we combine with the nonlocal splitting method to achieve the fully decoupled computation. The strategy can successfully transform the Allen-Cahn system into some completely independent algebraic equations and linear elliptic equations with constant coefficients, we only need to solve these simple equations at each time step. Moreover, we conducted some numerical experiments to demonstrate the effectiveness of the strategy.
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Although most of the existing image super-resolution(SR)methods have achieved superior performance,contrastive learning for high-level tasks has not been fully utilized in the existing image SR methods based on deep *...
详细信息
Although most of the existing image super-resolution(SR)methods have achieved superior performance,contrastive learning for high-level tasks has not been fully utilized in the existing image SR methods based on deep *** work focuses on two well-known strategies developed for lightweight and robust SR,i.e.,contrastive learning and feedback mechanism,and proposes an integrated solution called a split-based feedback network(SPFBN).The proposed SPFBN is based on a feedback mechanism to learn abstract representations and uses contrastive learning to explore high information in the representation ***,this work first uses hidden states and constraints in recurrent neural network(RNN)to implement a feedback ***,use contrastive learning to perform representation learning to obtain high-level information by pushing the final image to the intermediate images and pulling the final SR image to the high-resolution ***,a split-based feedback block(SPFB)is proposed to reduce model redundancy,which tolerates features with similar patterns but requires fewer *** experimental results demonstrate the superiority of the proposed method in comparison with the state-of-the-art ***,this work extends the experiment to prove the effectiveness of this method and shows better overall reconstruction quality.
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env...
详细信息
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh environment leads to significant variations in the shape and size of the defects. To address this challenge, we propose the multivariate time series segmentation network(MSSN), which adopts a multiscale convolutional network with multi-stage and depth-separable convolutions for efficient feature extraction through variable-length templates. To tackle the classification difficulty caused by structural signal variance, MSSN employs logarithmic normalization to adjust instance distributions. Furthermore, it integrates classification with smoothing loss functions to accurately identify defect segments amid similar structural and defect signal subsequences. Our algorithm evaluated on both the Mackey-Glass dataset and industrial dataset achieves over 95% localization and demonstrates the capture capability on the synthetic dataset. In a nuclear plant's heat transfer tube dataset, it captures 90% of defect instances with75% middle localization F1 score.
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task ...
详细信息
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task offloading is often *** is frequently assumed that vehicles can be accurately modeled during actual motion ***,in vehicular dynamic environments,both the tasks generated by the vehicles and the vehicles’surroundings are constantly changing,making it difficult to achieve real-time modeling for actual dynamic vehicular network *** into account the actual dynamic vehicular scenarios,this paper considers the real-time non-uniform movement of vehicles and proposes a vehicular task dynamic offloading and scheduling algorithm for single-task multi-vehicle vehicular network scenarios,attempting to solve the dynamic decision-making problem in task offloading *** optimization objective is to minimize the average task completion time,which is formulated as a multi-constrained non-linear programming *** to the mobility of vehicles,a constraint model is applied in the decision-making process to dynamically determine whether the communication range is sufficient for task offloading and ***,the proposed vehicular task dynamic offloading and scheduling algorithm based on muti-agent deep deterministic policy gradient(MADDPG)is applied to solve the optimal solution of the optimization *** results show that the algorithm proposed in this paper is able to achieve lower latency task computation ***,the average task completion time of the proposed algorithm in this paper can be improved by 7.6%compared to the performance of the MADDPG scheme and 51.1%compared to the performance of deep deterministic policy gradient(DDPG).
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,esp...
详细信息
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,especially for users who prefer to remain anonymous,especially on online social networks(OSNs).Moreover,due to the commercialization of online users'data,some service providers sell users'data to third parties at the blind side of the users,which leads to trust issues between users and service *** matters call for a system that gives online users much-needed control and autonomy of their *** the advancement of blockchain technology,many research institutions are experimenting with decentralized technologies to resolve the OSN user dilemma of privacy intrusion against third parties and *** resolve these limitations,we propose RecGuard,a privacy preservation blockchain-based network *** developed two smart contracts,RG-SH and RG-ST,to ensure the security and privacy of user *** RG-SH manages user data,whereas the RGST stores data.A graph convolutional network(GCN)was integrated with the blockchain-based system to detect malicious ***,we implemented our framework prototype on a locally simulated *** analysis and experiment results show that the proposed scheme demonstrates the effectiveness and privacy of users in our framework.
暂无评论