In the fields of robotic perception and computer vision, achieving accurate semantic segmentation of low-light or nighttime scenes is challenging. This is primarily due to the limited visibility of objects and the red...
详细信息
ISBN:
(数字)9798350384574
ISBN:
(纸本)9798350384581
In the fields of robotic perception and computer vision, achieving accurate semantic segmentation of low-light or nighttime scenes is challenging. This is primarily due to the limited visibility of objects and the reduced texture and color contrasts among them. To address the issue of limited visibility, we propose a hierarchical gated convolution unit, which simultaneously expands the receptive field and restores edge texture. To address the issue of reduced texture among objects, we propose a dual closed-loop bipartite matching algorithm to establish a total loss function consisting of the unsupervised illumination enhancement loss and supervised intersection-over-union loss, thus enabling the joint minimization of both losses via the Hungarian algorithm. We thus achieve end-to-end training for a semantic segmentation network especially suitable for handling low-light scenes. Experimental results demonstrate that the proposed network surpasses existing methods on the Cityscapes dataset and notably outperforms state-of-the-art methods on both Dark Zurich and Nighttime Driving datasets.
This paper proposes a novel method for multi-lane convoy formation control that uses large language models (LLMs) to tackle coordination challenges in dynamic highway environments. Each connected and autonomous vehicl...
详细信息
Short-circuit problems in unbalanced radial distribution networks have become more common as a result of distributed generation connectivity and smart grid advancements. An accurate and effective strategy for assessin...
详细信息
ISBN:
(数字)9798350372472
ISBN:
(纸本)9798350372489
Short-circuit problems in unbalanced radial distribution networks have become more common as a result of distributed generation connectivity and smart grid advancements. An accurate and effective strategy for assessing these faults due to short circuits is presented in this study. In contrast to traditional methods, this approach uses relationship matrices that are created expressly to take use of distribution network's radial characteristics. Through the examination of variations in bus voltages, bus current injections, and branch currents during fault conditions, the suggested method formulates the analysis of various fault types. The accuracy of developed method has been validated on IEEE-123 bus modified test network by comparing the obtained results with PSCAD/EMTDC simulation results.
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin...
详细信息
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifying the severity of patient conditions. Automatic recognition of state and feelings help in identifying patient symptoms to take immediate adequate action and providing a patient-centric medical plan tailored to a patient's state. In this paper, we propose a framework for pain-level detection for deployment in the United Arab Emirates and assess its performance using the most used approaches in the literature. Our results show that a deployment of a pain-level deep learning detection framework is promising in identifying the pain level accurately.
The first important step in extracting DNA characters is using the output data of MinION devices in the form of electrical current signals. Various cutting-edge base callers use this data to detect the DNA characters ...
详细信息
Human mesh recovery can be approached using either regression-based or optimization-based methods. Regression models achieve high pose accuracy but struggle with model-to-image alignment due to the lack of explicit 2D...
详细信息
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th...
详细信息
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire ***,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack ***,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been ***,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure ***,recently the high frequencies of DDoS attacks have increased *** this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has *** proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS *** obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.
作者:
Wang, ZhongZhang, LinWang, HeshengShanghai Jiao Tong University
State Key Laboratory of Avionics Integration and Aviation System-of-Systems Synthesis Department of Automation Key Laboratory of System Control and Information Processing of Ministry of Education Shanghai200240 China Tongji University
School of Computer Science and Technology National Pilot Software Engineering School with Chinese Characteristics Shanghai201804 China
Traditional LiDAR SLAM approaches prioritize localization over mapping, yet high-precision dense maps are essential for numerous applications involving intelligent agents. Recent advancements have introduced methods l...
详细信息
Using power-division multiplexing, a chaotic encryption method is proposed based on dynamic key generated from the instantaneously transmitted information. The influence of power allocation is analyzed and the securit...
Using power-division multiplexing, a chaotic encryption method is proposed based on dynamic key generated from the instantaneously transmitted information. The influence of power allocation is analyzed and the security with different key mismatches is demonstrated.
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clo...
详细信息
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
暂无评论