This research explores the use of haptic technology in heavy vehicle driving safety, focusing on its potential to enhance driver assistance systems and improve driving experience. The study addresses driver-induced ca...
详细信息
Gesture recognition has diverse application prospects in the field of human-computer ***,gesture recognition devices based on strain sensors have achieved remarkable results,among which liquid metal materials have con...
详细信息
Gesture recognition has diverse application prospects in the field of human-computer ***,gesture recognition devices based on strain sensors have achieved remarkable results,among which liquid metal materials have considerable advantages due to their high tensile strength and *** improve the detection sensitivity of liquid metal strain sensors,a sawtooth-enhanced bending sensor is proposed in this *** with the results from previous studies,the bending sensor shows enhanced resistance *** addition,combined with machine learning algorithms,a gesture recognition glove based on the sawtooth-enhanced bending sensor is also fabricated in this study,and various gestures are accurately *** the fields of human-computer interaction,wearable sensing,and medical health,the sawtooth-enhanced bending sensor shows great potential and can have wide application prospects.
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained ...
详细信息
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained attention due to their ability to leverage diverse feature sets from encrypted traffic,improving classification ***,existing research predominantly relies on late fusion techniques,which hinder the full utilization of deep features within the *** address this limitation,we propose a novel multimodal encrypted traffic classification model that synchronizes modality fusion with multiscale feature ***,our approach performs real-time fusion of modalities at each stage of feature extraction,enhancing feature representation at each level and preserving inter-level correlations for more effective *** continuous fusion strategy improves the model’s ability to detect subtle variations in encrypted traffic,while boosting its robustness and adaptability to evolving network *** results on two real-world encrypted traffic datasets demonstrate that our method achieves a classification accuracy of 98.23% and 97.63%,outperforming existing multimodal learning-based methods.
The success of vision transformer demonstrates that the transformer structure is also suitable for various vision tasks, including high-level classification tasks and low-level dense prediction tasks. Salient object d...
详细信息
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict th...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict their utility ***,besides the cost of the physical assets and network resources,such scaling may also imposemore loads on the electricity power grids to feed the added nodes with the required energy to run and cool,which comes with extra costs ***,those CDNproviders who utilize their resources better can certainly afford their services at lower price-units when compared to others who simply choose the scaling *** utilization is a quite challenging process;indeed,clients of CDNs usually tend to exaggerate their true resource requirements when they lease their *** providers are committed to their clients with Service Level Agreements(SLAs).Therefore,any amendment to the resource allocations needs to be approved by the clients *** this work,we propose deploying a Stackelberg leadership framework to formulate a negotiation game between the cloud service providers and their client *** this,the providers seek to retrieve those leased unused resources from their *** is not expected from the clients,and they may ask high price units to return their extra resources to the provider’s ***,to motivate cooperation in such a non-cooperative game,as an extension to theVickery auctions,we developed an incentive-compatible pricingmodel for the returned ***,we also proposed building a behavior belief function that shapes the way of negotiation and compensation for each *** to other benchmark models,the assessment results showthat our proposed models provide for timely negotiation schemes,allowing for better resource utilization rates,higher utilities,and grid-friend CDNs.
This paper investigates the efficacy of deep learning models for sentiment analysis using two publicly available datasets: IMDb’s movie review dataset and Amazon’s product review dataset. The main objective was to e...
详细信息
Early detection of plant diseases is crucial for enhancing agricultural productivity and ensuring crop protection. While computer vision offers scalable alternatives to manual inspection, existing methods face two und...
详细信息
In recent years,developed Intrusion Detection Systems(IDSs)perform a vital function in improving security and anomaly *** effectiveness of deep learning-based methods has been proven in extracting better features and ...
详细信息
In recent years,developed Intrusion Detection Systems(IDSs)perform a vital function in improving security and anomaly *** effectiveness of deep learning-based methods has been proven in extracting better features and more accurate classification than other *** this paper,a feature extraction with convolutional neural network on Internet of Things(IoT)called FECNNIoT is designed and implemented to better detect anomalies on the ***,a binary multi-objective enhance of the Gorilla troops optimizer called BMEGTO is developed for effective feature ***,the combination of FECNNIoT and BMEGTO and KNN algorithm-based classification technique has led to the presentation of a hybrid method called *** the next step,the proposed model is implemented on two benchmark data sets,NSL-KDD and TON-IoT and tested regarding the accuracy,precision,recall,and Fl-score *** proposed CNN-BMEGTO-KNN model has reached 99.99%and 99.86%accuracy on TON-IoT and NSL-KDD datasets,*** addition,the proposed BMEGTO method can identify about 27%and 25%of the effective features of the NSL-KDD and TON-IoT datasets,respectively.
In remote sensing image segmentation, data imbalance remains a critical challenge, particularly in datasets from networks and natural scenes, increasing task complexity. Recent studies have explored adversarial traini...
详细信息
暂无评论